Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-6103


Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.


Published

2006-12-31T05:00:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.6 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:S/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

2.7

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application x.org x.org 6.8.2 Yes
Application x.org x.org 6.9.0 Yes
Application x.org x.org 7.0 Yes
Application x.org x.org 7.1 Yes
Application xfree86_project xfree86 * Yes

References