First published: Sat Jun 15 2013(Updated: )
Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libxcursor | <=1.1.13 | |
Red Hat Libxcursor | =1.1.6 | |
Red Hat Libxcursor | =1.1.7 | |
Red Hat Libxcursor | =1.1.8 | |
Red Hat Libxcursor | =1.1.9 | |
Red Hat Libxcursor | =1.1.10 | |
Red Hat Libxcursor | =1.1.11 | |
Red Hat Libxcursor | =1.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2003 has a moderate severity level due to the potential for memory allocation errors leading to a buffer overflow.
To fix CVE-2013-2003, upgrade to libXcursor version 1.1.14 or later as it contains a patch for the vulnerability.
CVE-2013-2003 affects all versions of X.org libXcursor prior to 1.1.14, including versions 1.1.6 through 1.1.12.
CVE-2013-2003 is an integer overflow vulnerability that can lead to buffer overflow issues.
Yes, CVE-2013-2003 can be exploited remotely, allowing attackers to cause disruptions or execute arbitrary code.