First published: Sat Jun 15 2013(Updated: )
Multiple integer overflows in X.org libchromeXvMC and libchromeXvMCPro in openChrome 0.3.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) uniDRIOpenConnection and (2) uniDRIGetClientDriverName functions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenChrome | <=0.3.2 | |
X Libchromexvmc | ||
X Libchromexvmcpro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1994 is considered a high severity vulnerability due to its potential to cause buffer overflow and memory allocation issues.
To fix CVE-2013-1994, update to the latest version of OpenChrome beyond 0.3.2, and ensure that all affected libraries are updated.
CVE-2013-1994 affects OpenChrome versions 0.3.2 and earlier, as well as the associated libchromeXvMC and libchromeXvMCPro libraries.
Exploitation of CVE-2013-1994 can lead to arbitrary code execution and compromise the integrity of the system.
Currently, the main mitigation for CVE-2013-1994 is to avoid running vulnerable versions of OpenChrome and to ensure systems are regularly updated.