First published: Sat Jun 15 2013(Updated: )
Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libxinerama | <=1.1.2 | |
Red Hat Libxinerama | =1.0.2 | |
Red Hat Libxinerama | =1.0.3 | |
Red Hat Libxinerama | =1.0.99.1 | |
Red Hat Libxinerama | =1.1 | |
Red Hat Libxinerama | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1985 is rated as a moderate severity vulnerability due to potential buffer overflow issues.
To fix CVE-2013-1985, upgrade to libXinerama version 1.1.3 or later.
Affected versions include libXinerama 1.1.2 and earlier, along with specific earlier versions.
CVE-2013-1985 can lead to a buffer overflow, potentially allowing unauthorized access or crashes.
The exploitability of CVE-2013-1985 largely depends on the configuration of the X server and local network policies.