Description
Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2673-1 | libdmx security update |
EUVD |
EUVD-2013-1980 | Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions. |
Ubuntu USN |
USN-1852-1 | libdmx vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:20:37.448Z
Reserved: 2013-02-19T00:00:00.000Z
Link: CVE-2013-1992
No data.
Status : Deferred
Published: 2013-06-15T19:55:01.140
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-1992
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN