Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code …
Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
https://cwe.mitre.org/data/definitions/129.html →Open in CWE collection →Weaknesses in this category are related to improper calculation or conversion of numbers.
https://cwe.mitre.org/data/definitions/189.html →Open in CWE collection →Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
https://capec.mitre.org/data/definitions/100.html →Open in CAPEC collection →| Product | Vendor | Status |
|---|---|---|
| libX11 | Tracked | |
| libXcursor | Tracked | |
| libXext | Tracked | |
| libXfixes | Tracked | |
| libXi | Tracked | |
| libXinerama | Tracked | |
| libXp | Tracked | |
| libXrandr | Tracked | |
| libXrender | Tracked | |
| libXres | Tracked | |
| libXt | Tracked | |
| libXtst | Tracked | |
| libXv | Tracked | |
| libXvMC | Tracked | |
| libXxf86dga | Tracked | |
| libXxf86vm | Tracked | |
| libdmx | Tracked | |
| libxcb | Tracked | |
| libxt | Tracked | |
| xcb-proto | Tracked |