First published: Sat Jun 15 2013(Updated: )
Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Libxxf86vm | <=1.1.2 | |
Oracle Libxxf86vm | =1.0.1 | |
Oracle Libxxf86vm | =1.0.2 | |
Oracle Libxxf86vm | =1.0.99.1 | |
Oracle Libxxf86vm | =1.1.0 | |
Oracle Libxxf86vm | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2001 is classified as a high severity vulnerability due to the potential for denial of service and arbitrary code execution.
To fix CVE-2013-2001, upgrade to the patched version of libXxf86vm that is later than 1.1.2.
CVE-2013-2001 can lead to crashes of the X server and may allow attackers to execute arbitrary code.
Versions of libXxf86vm up to and including 1.1.2 are affected by CVE-2013-2001.
CVE-2013-2001 can potentially be exploited remotely depending on the configuration of the X server.