First published: Tue Dec 13 2016(Updated: )
Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =24 | |
Fedora | =25 | |
CentOS LibXtst | <=1.2.2 |
https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7951 is classified with a medium severity due to potential remote code execution risks.
To mitigate CVE-2016-7951, update the libXtst library to version 1.2.3 or later.
CVE-2016-7951 affects X.org libXtst versions up to and including 1.2.2, as well as Fedora 24 and 25.
CVE-2016-7951 is an integer overflow vulnerability.
Yes, CVE-2016-7951 can be exploited by remote X servers due to the lack of proper range checks.