Two stack-based buffer overflow flaws were found in the way libX11, the Core X11 protocol client library, processed certain user-specified files. A malicious X11 server could possibly use this flaw to crash an X11 client via a specially crafted file.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | libX11 | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXcursor | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXfixes | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXi | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXrandr | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXrender | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXres | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXt | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXv | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXvMC | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXxf86dga | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libXxf86vm | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | libdmx | 2014-11-22 14:00 | ALAS-2014-452 |
Amazon Linux 1 | xorg-x11-proto-devel | 2014-11-22 14:00 | ALAS-2014-452 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 1.8 | AV:A/AC:H/Au:N/C:N/I:N/A:P |
NVD | CVSSv2 | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |