You are here

CVE-2013-2062

Vincent (CVE) Danen's picture
Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.

Details Source

Mitre

Statement

This issue affects the libXp package in Red Hat Enterprise Linux 5. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not planned to be fixed in Red Hat Enterprise Linux 5 as it is now in Production 3 Phase of the support and maintenance life cycle: https://access.redhat.com/support/policy/updates/errata/

Public Date

2013-05-23 00:00:00

Impact

Moderate

Bugzilla

CVE-2013-2062 libXp: Integer overflow leading to heap-based buffer overflow

Bugzilla ID

960 362

CVSS Status

verified

Base Score

4.30

Base Metrics

AV:A/AC:H/Au:N/C:P/I:P/A:P

External References

http://www.x.org/wiki/Development/Security/Advisory-2013-05-23

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (libXp) RHSA-2014:1436 2014-10-13

CWE

CWE-190->CWE-122

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 libXp Not affected
Red Hat Enterprise Linux 5 libXp Will not fix