CVE-2013-1987
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
15/06/2013
Last modified:
11/04/2025
Description
Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:* | 0.9.7 (including) | |
cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html
- http://www.debian.org/security/2013/dsa-2677
- http://www.openwall.com/lists/oss-security/2013/05/23/3
- http://www.securityfocus.com/bid/60132
- http://www.ubuntu.com/usn/USN-1863-1
- http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html
- http://www.debian.org/security/2013/dsa-2677
- http://www.openwall.com/lists/oss-security/2013/05/23/3
- http://www.securityfocus.com/bid/60132
- http://www.ubuntu.com/usn/USN-1863-1
- http://www.x.org/wiki/Development/Security/Advisory-2013-05-23