Show plain JSON{"affected_release": [{"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libdmx-0:1.1.3-3.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libX11-0:1.6.0-2.2.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libxcb-0:1.9.1-2.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXcursor-0:1.1.14-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXext-0:1.3.2-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXfixes-0:5.0.1-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXi-0:1.7.2-2.2.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXinerama-0:1.1.3-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXp-0:1.0.2-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXrandr-0:1.4.1-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXrender-0:0.9.8-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXres-0:1.0.7-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXt-0:1.1.4-6.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXtst-0:1.2.2-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXv-0:1.0.9-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXvMC-0:1.0.8-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXxf86dga-0:1.1.4-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXxf86vm-0:1.1.3-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xcb-proto-0:1.8-3.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xkeyboard-config-0:2.11-1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xorg-x11-proto-devel-0:7.7-9.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xorg-x11-xtrans-devel-0:1.3.4-1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}], "bugzilla": {"description": "libX11: unbounded recursion leading to stack-overflow", "id": "959112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112"}, "csaw": false, "cvss": {"cvss_base_score": "1.8", "cvss_scoring_vector": "AV:A/AC:H/Au:N/C:N/I:N/A:P", "status": "verified"}, "cwe": "CWE-835->CWE-121", "details": ["The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.", "Two stack-based buffer overflow flaws were found in the way libX11, the Core X11 protocol client library, processed certain user-specified files. A malicious X11 server could possibly use this flaw to crash an X11 client via a specially crafted file."], "name": "CVE-2013-2004", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Will not fix", "package_name": "libX11", "product_name": "Red Hat Enterprise Linux 5"}], "public_date": "2013-05-23T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2013-2004\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-2004\nhttp://www.x.org/wiki/Development/Security/Advisory-2013-05-23"], "statement": "This issue affects the libX11 package in Red Hat Enterprise Linux 5. Red Hat Product Security has rated this issue as having Low security impact. This issue is not planned to be fixed in Red Hat Enterprise Linux 5 as it is now in Production 3 Phase of the support and maintenance life cycle: https://access.redhat.com/support/policy/updates/errata/", "threat_severity": "Low"}