3 results (0.025 seconds)

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data. Las funciones (1) XvQueryAdaptors y (2) XvQueryEncodings en X.org libXv en versiones anteriores a 1.0.11 permiten a servidores remotos X para desencadenar operaciones de acceso a memoria fuera de rango a través de vectores que involucran especificaciones de longitud en los datos recibidos. • http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93368 http://www.securitytracker.com/id/1036945 https://cgit.freedesktop.org/xorg/lib/libXv/commit/?id=d9da580b46a28ab497de2e94fdc7b9ff953dab17 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3IA7BLB4C3JOYVU6UASGUJQJKUF6TO7E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AE2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function. Múltiples desbordamientos de enteros en X.org libXv v1.0.7 y anteriores permiten a los servidores X provocar una asignación de memoria insuficiente y un desbordamiento de búfer a través de vectores relacionados con las funciones (1) XvQueryPortAttributes, (2) XvListImageFormats, y (3) XvCreateImage. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html http://www.debian.org/security/2013/dsa-2674 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1867-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-1989 https://bugzilla.redhat.com/show_bug.cgi?id=959068 • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 1%CPEs: 12EXPL: 0

Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function. Un desbordamiento de búfer en libXv X.org v1.0.7 y anteriores permite causar una denegación de servicio a los servidores X (por caída de los mismos) y posiblemente ejecutar código de su elección a través de valores de longitud o de índice de la función XvQueryPortAttributes debidamente modificados. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html http://www.debian.org/security/2013/dsa-2674 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1867-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-2066 https://bugzilla.redhat.com/show_bug.cgi?id=960369 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •