First published: Sat Jun 15 2013(Updated: )
Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org libXtst | <=1.2.1 | |
X.org libXtst | =1.0.2 | |
X.org libXtst | =1.0.3 | |
X.org libXtst | =1.0.99.1 | |
X.org libXtst | =1.0.99.2 | |
X.org libXtst | =1.1.0 | |
X.org libXtst | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2063 is classified as a high severity vulnerability due to the potential for a buffer overflow leading to memory corruption.
To fix CVE-2013-2063, update the X.org libXtst package to version 1.2.2 or later.
CVE-2013-2063 affects X.org libXtst version 1.2.1 and earlier, including specific versions like 1.0.2, 1.0.3, and 1.1.0.
CVE-2013-2063 is an integer overflow vulnerability that can lead to buffer overflow in X servers.
Yes, CVE-2013-2063 can potentially be exploited remotely due to its exploitation methodology involving X server interactions.