Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-2064


Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.


Published

2013-06-15T19:55:01.233

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-189

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System debian debian_linux 6.0 Yes
Operating System debian debian_linux 7.0 Yes
Application oracle secure_global_desktop 4.71 Yes
Application oracle secure_global_desktop 5.2 Yes
Operating System canonical ubuntu_linux 10.04 Yes
Operating System canonical ubuntu_linux 12.04 Yes
Operating System canonical ubuntu_linux 12.10 Yes
Operating System canonical ubuntu_linux 13.04 Yes
Operating System opensuse opensuse 12.2 Yes
Operating System opensuse opensuse 12.3 Yes
Operating System fedoraproject fedora 19 Yes
Application x libxcb ≤ 1.9 Yes
Application x libxcb 1.1.90.1 Yes
Application x libxcb 1.1.91 Yes
Application x libxcb 1.1.92 Yes
Application x libxcb 1.1.93 Yes
Application x libxcb 1.2 Yes
Application x libxcb 1.3 Yes
Application x libxcb 1.4 Yes
Application x libxcb 1.5 Yes
Application x libxcb 1.6 Yes
Application x libxcb 1.7 Yes
Application x libxcb 1.8 Yes
Application x libxcb 1.8.1 Yes

References