CVE-2013-2000
libXxf86dga: Array Index error leading to heap-based OOB write
Severity Score
6.8
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
Múltiples desbordamientos de búfer en X.org libXxf86dga v1.1.3 y anteriores permiten que los servidores X para causar una denegación de servicio (caída) y posiblemente ejecutar código de su elección a través de valores de índice o de longitud de las funciones (1) XDGAQueryModes y (2) XDGASetMode.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2013-02-19 CVE Reserved
- 2013-05-23 CVE Published
- 2024-07-09 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2013/05/23/3 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html | 2013-11-25 | |
http://www.debian.org/security/2013/dsa-2690 | 2013-11-25 | |
http://www.ubuntu.com/usn/USN-1869-1 | 2013-11-25 | |
http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 | 2013-11-25 | |
https://access.redhat.com/security/cve/CVE-2013-2000 | 2014-10-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=960349 | 2014-10-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | <= 1.1.3 Search vendor "X" for product "Libxxf86dga" and version " <= 1.1.3" | - |
Affected
| ||||||
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | 1.0.1 Search vendor "X" for product "Libxxf86dga" and version "1.0.1" | - |
Affected
| ||||||
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | 1.0.2 Search vendor "X" for product "Libxxf86dga" and version "1.0.2" | - |
Affected
| ||||||
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | 1.0.99.1 Search vendor "X" for product "Libxxf86dga" and version "1.0.99.1" | - |
Affected
| ||||||
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | 1.0.99.2 Search vendor "X" for product "Libxxf86dga" and version "1.0.99.2" | - |
Affected
| ||||||
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | 1.1 Search vendor "X" for product "Libxxf86dga" and version "1.1" | - |
Affected
| ||||||
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | 1.1.1 Search vendor "X" for product "Libxxf86dga" and version "1.1.1" | - |
Affected
| ||||||
X Search vendor "X" | Libxxf86dga Search vendor "X" for product "Libxxf86dga" | 1.1.2 Search vendor "X" for product "Libxxf86dga" and version "1.1.2" | - |
Affected
|