Page 7 of 162 results (0.024 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

28 Aug 2020 — An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability. Se encontró una vulnerabilidad de desbordamiento de enteros conllevando a una doble liberación en libX11. Este fallo permite a un atacante privilegiado local causar que una a... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363 • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVSS: 6.7EPSS: 0%CPEs: 11EXPL: 0

05 Aug 2020 — An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux. Se encontró un desbordamiento de enteros conllevando a un desbordamiento del búfer de la pila en el cliente X Input Method (XIM), se implementó en libX11 anterior a la versión... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

04 Aug 2020 — A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable. Se encontró un fallo en la manera en que la memoria de xserver no fue inicializada apropiadamente. • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html • CWE-665: Improper Initialization •

CVSS: 7.8EPSS: 16%CPEs: 1EXPL: 2

16 Oct 2019 — "" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact. Note: It is disputed if the X.Org X Server is involved or if there is a stack overflow. En X.Org X Server versión 1.20.4, se presenta un desbordamiento de búfer en la región stack de la memoria en la función XQueryKeymap. Por ejemplo, al enviar ct.c_char 1000 vec... • https://packetstorm.news/files/id/154868 • CWE-787: Out-of-bounds Write •

CVSS: 7.2EPSS: 8%CPEs: 11EXPL: 21

25 Oct 2018 — A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges. Se ha descubierto un problema en versiones anteriores a la 1.20.3 de xorg-x11-server. Hay una comprobación incorrecta de permisos para las opciones -modulepath y -logfile al iniciar Xorg. • https://packetstorm.news/files/id/150295 • CWE-271: Privilege Dropping / Lowering Errors CWE-863: Incorrect Authorization •

CVSS: 9.8EPSS: 1%CPEs: 10EXPL: 0

21 Aug 2018 — An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact. Se ha descubierto un problema en libX11 hasta su versión 1.6.5. La función XListExtensions en ListExt.c es vulnerable a un error por un paso provocado por respuestas maliciosas del servidor, lo que conduce a una denegación de servicio (DoS) o a otro tipo de impacto sin especificar. An off-by-... • http://www.openwall.com/lists/oss-security/2018/08/21/6 • CWE-193: Off-by-one Error CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 9%CPEs: 6EXPL: 0

21 Aug 2018 — An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution. Se ha descubierto un problema en libX11 hasta su versión 1.6.5. La función XListExtensions en ListExt.c interpreta una variable como firmada en lugar de no firmada, lo que resulta en una escritura fuera de límites (de hasta 128 bytes), lo que conduce a una denegación d... • http://www.openwall.com/lists/oss-security/2018/08/21/6 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

21 Aug 2018 — An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault). Se ha descubierto un problema en XListExtensions en ListExt.c en libX11 hasta la versión 1.6.5. Un servidor malicioso puede enviar una respuesta en la cual la primera cadena se desborda, provocando que una variable se establezca como NULL y se libere post... • http://www.openwall.com/lists/oss-security/2018/08/21/6 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

17 Oct 2017 — xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. xorg-x11-server en versiones anteriores a la 1.19.5 era vulnerable a un desbordamiento de enteros en la función ProcDbeGetVisualInfo, lo que permitiría que atacantes provoquen que el cliente malicioso X haga que el servidor X se cierre inesperadamente o que, posiblemente, ejecute código arbitrario. It was discovered that ... • https://bugzilla.redhat.com/show_bug.cgi?id=1509218 • CWE-190: Integer Overflow or Wraparound CWE-391: Unchecked Error Condition •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 1

17 Oct 2017 — xorg-x11-server before 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. xorg-x11-server en versiones anteriores a la 1.19.5 no tenía una validación de longitud en la extensión X-Resource, lo que permitía que atacantes remotos permitan que el cliente malicioso X provoque que el servidor X se cierre inesperadamente o que, posiblemente, ejecute código arbitrario. It was discovered that the X.Org X server inco... • https://bugzilla.redhat.com/show_bug.cgi?id=1509216 • CWE-20: Improper Input Validation CWE-391: Unchecked Error Condition •