First published: Tue May 02 2006(Updated: )
Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&" instead of a "*" operator. NOTE: the subject line of the original announcement used an incorrect CVE number for this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X11 Fonts Utilities | =6.7.0 | |
X11 Fonts Utilities | =6.8 | |
X11 Fonts Utilities | =6.8.1 | |
X11 Fonts Utilities | =6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1526 is rated as a critical vulnerability due to its ability to cause a denial of service by crashing the X.org X server.
To fix CVE-2006-1526, upgrade the X.org X server to version 6.8.1 or higher.
CVE-2006-1526 affects X.org X server versions 6.7.0 to 6.9 inclusive.
CVE-2006-1526 can be exploited through specific requests like XRenderCompositeTriStrip and XRenderCompositeTriFan, leading to server crashes.
Yes, CVE-2006-1526 can potentially be exploited remotely, allowing attackers to target the X server over a network.