CVE-2013-1981

Source
https://nvd.nist.gov/vuln/detail/CVE-2013-1981
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2013-1981.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2013-1981
Related
Published
2013-06-15T19:55:00Z
Modified
2024-09-18T01:00:21Z
Summary
[none]
Details

Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.

References

Affected packages

Debian:11 / libx11

Package

Name
libx11
Purl
pkg:deb/debian/libx11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.5.0-1+deb7u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libx11

Package

Name
libx11
Purl
pkg:deb/debian/libx11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.5.0-1+deb7u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libx11

Package

Name
libx11
Purl
pkg:deb/debian/libx11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.5.0-1+deb7u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}