SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   X Vendors:   X.org
X Client Library Bugs Let Remote and Local Users Deny Service or Gain Elevated Privileges
SecurityTracker Alert ID:  1036945
SecurityTracker URL:  http://securitytracker.com/id/1036945
CVE Reference:   CVE-2016-5407, CVE-2016-7942, CVE-2016-7943, CVE-2016-7944, CVE-2016-7945, CVE-2016-7946, CVE-2016-7947, CVE-2016-7948, CVE-2016-7949, CVE-2016-7950, CVE-2016-7951, CVE-2016-7952, CVE-2016-7953   (Links to External Site)
Date:  Oct 5 2016
Impact:   Denial of service via local system, Denial of service via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in X client libraries. A remote or local user can cause denial of service conditions on the target system. A remote or local user can gain elevated privileges.

Several X client libraries do not properly validate data received from the X server. A remote or local X server can supply specially crafted data to trigger an out-of-bounds memory read or write error, integer overflow, buffer underflow, endless loop, or other error.

An out-of-bounds memory read or write error may occur in libX11 [CVE-2016-7942, CVE-2016-7943].

An integer overflow may occur in libXfixes on 32-bit systems [CVE-2016-7944].

An out-of-bounds memory access error or endless loop may occur in libXi [CVE-2016-7945, CVE-2016-7946].

A integer overflow may occur in libXrandr [CVE-2016-7947]. Other errors may occur [CVE-2016-7948].

An out-of-bounds memory write error may occur in libXrender [CVE-2016-7949, CVE-2016-7950].

An integer overflow may occur in XRecord [CVE-2016-7951]. Other errors may occur in XRecord [CVE-2016-7952].

A memory corruption error may occur in libXv [CVE-2016-5407].

A buffer read underflow may occur in libXvMC [CVE-2016-7953].

The impact depends on the applications that use the affected libraries.

Tobias Stoeckmann from the OpenBSD project reported these vulnerabilities.

Impact:   A remote or local user can cause denial of service conditions.

A remote or local user can gain elevated privileges on the target system.

The impact depends on the applications that use the affected libraries.

Solution:   The vendor has issued source code fixes. A fix will also be available in the following versions:

libX11 1.6.4
libXfixes 5.0.3
libXi 1.7.7
libXrandr 1.5.1
libXrender 0.9.10
libXtst 1.2.3
libXv 1.0.11
libXvMC 1.0.10

Vendor URL:  x.org/ (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC