First published: Mon Mar 15 2004(Updated: )
XFree86 4.1.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an out-of-bounds array index when using the GLX extension and Direct Rendering Infrastructure (DRI).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XFree86 X Server | =4.1.0 | |
XFree86 X Server | =4.3.0 | |
XFree86 X Server | =4.2.1 | |
XFree86 X Server | =4.2.0 | |
XFree86 X Server | =4.1.12 | |
XFree86 X Server | =4.2.1 | |
XFree86 X Server | =4.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0093 has a critical severity rating due to the potential for remote denial of service and arbitrary code execution.
To fix CVE-2004-0093, update to a patched version of XFree86 that resolves the out-of-bounds array index issue.
CVE-2004-0093 affects XFree86 versions 4.1.0, 4.1.11, 4.1.12, 4.2.0, 4.2.1, and 4.3.0.
Yes, CVE-2004-0093 can potentially allow remote attackers to execute arbitrary code due to an out-of-bounds access.
There are no known workarounds for CVE-2004-0093; updating the software is the recommended action.