Vulnerability Description
Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allow remote attackers to have unspecified impact via a crafted request, which triggers a buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| X.Org | Libx11 | 1.0.1 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| X.Org | X11 | 6.0 |
Related Weaknesses (CWE)
References
- http://lists.x.org/archives/xorg-announce/2015-April/002561.htmlPatchVendor Advisory
- http://seclists.org/oss-sec/2015/q2/81Third Party AdvisoryVDB Entry
- http://www.debian.org/security/2015/dsa-3224Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/73962Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2568-1Third Party Advisory
- https://bugs.freedesktop.org/show_bug.cgi?id=56508Issue Tracking
- http://lists.x.org/archives/xorg-announce/2015-April/002561.htmlPatchVendor Advisory
- http://seclists.org/oss-sec/2015/q2/81Third Party AdvisoryVDB Entry
- http://www.debian.org/security/2015/dsa-3224Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/73962Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2568-1Third Party Advisory
- https://bugs.freedesktop.org/show_bug.cgi?id=56508Issue Tracking
FAQ
What is CVE-2013-7439?
CVE-2013-7439 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allow remote attackers to have unspecified impact via a crafted re...
How severe is CVE-2013-7439?
CVE-2013-7439 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7439?
Check the references section above for vendor advisories and patch information. Affected products include: X.Org Libx11, Canonical Ubuntu Linux, Debian Debian Linux, X.Org X11.