CVE-2013-1981

NameCVE-2013-1981
DescriptionMultiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2693-1
NVD severitymedium (attack range: remote)
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libx11 (PTS)squeeze (security), squeeze2:1.3.3-4+squeeze1fixed
squeeze (lts)2:1.3.3-4+squeeze2fixed
wheezy2:1.5.0-1+deb7u1fixed
wheezy (security)2:1.5.0-1+deb7u2fixed
sid, jessie2:1.6.2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libx11source(unstable)2:1.5.0-1+deb7u1medium
libx11sourcesqueeze2:1.3.3-4+squeeze1mediumDSA-2693-1
libx11sourcewheezy2:1.5.0-1+deb7u1mediumDSA-2693-1

Search for package or bug name: Reporting problems