First published: Sat Jun 15 2013(Updated: )
X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libXi | <=1.7.1 | |
libXi | =1.5.0 | |
libXi | =1.5.99.2 | |
libXi | =1.5.99.3 | |
libXi | =1.6.0 | |
libXi | =1.6.1 | |
libXi | =1.6.2 | |
libXi | =1.6.99.1 | |
libXi | =1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1995 is categorized as a medium severity vulnerability due to the potential for a buffer overflow.
Updating to version 1.7.2 or later of X.org libXi resolves the CVE-2013-1995 vulnerability.
CVE-2013-1995 affects X.org libXi versions 1.7.1 and earlier, including specific versions like 1.5.0, 1.6.2, and others.
Exploiting CVE-2013-1995 can result in a buffer overflow, leading to possible arbitrary code execution or application crashes.
CVE-2013-1995 was publicly disclosed in May 2013, but it is not classified as a zero-day vulnerability since it is no longer unknown.