CVE-2013-1591

Impact:
Moderate
Public Date:
2012-09-15
CWE:
CWE-121
Bugzilla:
910149: CVE-2013-1591 pixman: stack-based buffer overflow

The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.

Find out more about CVE-2013-1591 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of pixman as shipped with Red Hat Enterprise Linux 5 as it did not contain the vulnerable code.

CVSS v2 metrics

Base Score 6.5
Base Metrics AV:N/AC:L/Au:S/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2013:0746 2013-04-23
Red Hat Enterprise Linux 6 (pixman) RHSA-2013:0687 2013-03-27

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 pixman Not affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.