Vulnerability Description
Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| X.Org | X.Org | 6.8.2 |
| Xfree86 Project | Xfree86 | All versions |
References
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&obje
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465PatchVendor Advisory
- http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.htmlPatchVendor Advisory
- http://osvdb.org/32086
- http://secunia.com/advisories/23633
- http://secunia.com/advisories/23670
- http://secunia.com/advisories/23684
- http://secunia.com/advisories/23689
- http://secunia.com/advisories/23698
- http://secunia.com/advisories/23705
- http://secunia.com/advisories/23758
- http://secunia.com/advisories/23789
- http://secunia.com/advisories/23966
- http://secunia.com/advisories/24168
FAQ
What is CVE-2006-6103?
CVE-2006-6103 is a vulnerability with a CVSS score of 6.6 (MEDIUM). Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protoc...
How severe is CVE-2006-6103?
CVE-2006-6103 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6103?
Check the references section above for vendor advisories and patch information. Affected products include: X.Org X.Org, Xfree86 Project Xfree86.