First published: Sat Jun 15 2013(Updated: )
Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libxv | <=1.0.7 | |
Red Hat Libxv | =1.0.2 | |
Red Hat Libxv | =1.0.3 | |
Red Hat Libxv | =1.0.4 | |
Red Hat Libxv | =1.0.5 | |
Red Hat Libxv | =1.0.6 | |
X.org libXv | =1.0.2 | |
X.org libXv | =1.0.3 | |
X.org libXv | =1.0.4 | |
X.org libXv | =1.0.5 | |
X.org libXv | =1.0.6 | |
X.org libXv | =1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2066 is classified as a serious vulnerability that can lead to denial of service and potentially arbitrary code execution.
To fix CVE-2013-2066, update the libXv package to version 1.0.8 or later, which includes the patch for this vulnerability.
The affected versions of libXv for CVE-2013-2066 include all versions up to and including 1.0.7.
Yes, CVE-2013-2066 can potentially be exploited remotely if a malicious actor manages to send crafted requests to the vulnerable X server.
The impact of CVE-2013-2066 includes system crashes and the possibility of executing arbitrary code, which can compromise the integrity of affected systems.