3 results (0.005 seconds)

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

Buffer underflow in X.org libXvMC before 1.0.10 allows remote X servers to have unspecified impact via an empty string. Desbordamiento inferior de búfer en X.org libXvMC en versiones anteriores a 1.0.10 permite a servidores remotos X tener un impacto no especificado a través de una cadena vacía. • http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93371 http://www.securitytracker.com/id/1036945 https://cgit.freedesktop.org/xorg/lib/libXvMC/commit/?id=2cd95e7da8367cccdcdd5c9b160012d1dec5cbdb https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLZ3CBE3LKTSHIQYM6RKZYJ5PJ5IGTYG https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions. Múltiples desbordamientos de enteros en X.org libXvMC v1.0.7 y anteriores permiten a los servidores X provocar una asignación de memoria insuficiente y un desbordamiento de búfer a través de vectores relacionados con las funciones (1) XvMCListSurfaceTypes y (2) XvMCListSubpictureTypes. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html http://www.debian.org/security/2013/dsa-2675 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1868-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-1990 https://bugzilla.redhat.com/show_bug.cgi?id=959070 • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 0

Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function. Un desbordamiento de búfer en X.org libXvMC v1.0.7 y anteriores permite a los servidores X causar una denegación de servicio (por caída del servidor) y posiblemente ejecutar código de su elección a través de valores de índice o de longitud debidamente modificados en la función XvMCGetDRInfo. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html http://www.debian.org/security/2013/dsa-2675 http://www.openwall.com/lists/oss-security/2013/05/23/3 http://www.ubuntu.com/usn/USN-1868-1 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 https://access.redhat.com/security/cve/CVE-2013-1999 https://bugzilla.redhat.com/show_bug.cgi?id=960347 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •