Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-6103

Опубликовано: 31 дек. 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.6

Описание

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1.0.2-0ubuntu10.7
devel

released

1.2.0-3ubuntu8
edgy

released

1.1.1-0ubuntu12.2
feisty

released

1.2.0-3ubuntu8
upstream

needs-triage

Показывать по

EPSS

Процентиль: 12%
0.00043
Низкий

6.6 Medium

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.

nvd
больше 18 лет назад

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.

debian
больше 18 лет назад

Integer overflow in the ProcDbeSwapBuffers function in the DBE extensi ...

github
больше 3 лет назад

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.

fstec
больше 18 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 12%
0.00043
Низкий

6.6 Medium

CVSS2