First published: Fri Jan 13 2006(Updated: )
The XClientMessageEvent struct used in certain components of X.Org 6.8.2 and earlier, possibly including (1) the X server and (2) Xlib, uses a "long" specifier for elements of the l array, which results in inconsistent sizes in the struct on 32-bit versus 64-bit platforms, and might allow attackers to cause a denial of service (application crash) and possibly conduct other attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
X Server (X.Org) | <=6.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0197 has a medium severity rating due to the potential for attackers to exploit inconsistencies in data structures.
To fix CVE-2006-0197, update to a version later than X.Org 6.8.2 that addresses this vulnerability.
CVE-2006-0197 affects X.Org versions up to and including 6.8.2 on both 32-bit and 64-bit platforms.
Yes, CVE-2006-0197 could potentially allow remote code execution due to the struct inconsistency issue.
There are no specific workarounds for CVE-2006-0197; the best method is to apply the fix by upgrading the software.