MEDIUM · 6.6

CVE-2006-6103

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protoc...

Vulnerability Description

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.

CVSS Score

6.6

MEDIUM

AV:L/AC:M/Au:S/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
X.OrgX.Org6.8.2
Xfree86 ProjectXfree86All versions

References

FAQ

What is CVE-2006-6103?

CVE-2006-6103 is a vulnerability with a CVSS score of 6.6 (MEDIUM). Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protoc...

How severe is CVE-2006-6103?

CVE-2006-6103 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2006-6103?

Check the references section above for vendor advisories and patch information. Affected products include: X.Org X.Org, Xfree86 Project Xfree86.