Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-7944

Опубликовано: 25 сент. 2016
Источник: redhat
CVSS3: 4.2
CVSS2: 4.3

Описание

Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libXfixesWill not fix
Red Hat Enterprise Linux 6libXfixesWill not fix
Red Hat Enterprise Linux 7libXfixesWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1381865libXfixes: Insufficient validation of server responses results in Integer overflow

4.2 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.

CVSS3: 9.8
nvd
около 9 лет назад

Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.

CVSS3: 9.8
debian
около 9 лет назад

Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms m ...

suse-cvrf
около 9 лет назад

Security update for xorg-x11-libXfixes

CVSS3: 9.8
github
больше 3 лет назад

Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.

4.2 Medium

CVSS3

4.3 Medium

CVSS2