First published: Sat Jun 15 2013(Updated: )
Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libxv | <=1.0.7 | |
Red Hat Libxv | =1.0.2 | |
Red Hat Libxv | =1.0.3 | |
Red Hat Libxv | =1.0.4 | |
Red Hat Libxv | =1.0.5 | |
Red Hat Libxv | =1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1989 is considered to have a high severity due to potential buffer overflow vulnerabilities that can lead to system crashes or arbitrary code execution.
To fix CVE-2013-1989, upgrade to libXv version 1.0.8 or later, which contains the necessary patches.
CVE-2013-1989 affects libXv versions up to and including 1.0.7, including specific versions 1.0.2, 1.0.3, 1.0.4, 1.0.5, and 1.0.6.
Users running vulnerable versions of libXv may experience application crashes or be susceptible to remote code execution attacks.
To check if your system is vulnerable to CVE-2013-1989, verify the installed version of libXv and compare it with the affected versions listed in the vulnerability details.