Vulnerability & Exploit Database

Displaying entries 1 - 10 of 27 in total

Results for: CVE-2016-2828 Back to search

SUSE: CVE-2016-7952: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: October 12, 2016

X.org libXtst before 1.2.3 allows remote X servers to cause a denial of service (infinite loop) via a reply in the (1) XRecordStartOfData, (2) XRecordEndOfData, or (3) XRecordClientDied category without a client sequence and with attached data.

SUSE: CVE-2016-7951: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: October 12, 2016

Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.

SUSE: CVE-2016-7950: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: October 12, 2016

The XRenderQueryFilters function in X.org libXrender before 0.9.10 allows remote X servers to trigger out-of-bounds write operations via vectors involving filter name lengths.

SUSE: CVE-2016-7949: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: October 12, 2016

Multiple buffer overflows in the (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXrender before 0.9.10 allow remote X servers to trigger out-of-bounds write operations via vectors involving length fields.

SUSE: CVE-2016-7947: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: October 12, 2016

Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.

SUSE: CVE-2016-7945: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: October 12, 2016

Multiple integer overflows in X.org libXi before 1.7.7 allow remote X servers to cause a denial of service (out-of-bounds memory access or infinite loop) via vectors involving length fields.

SUSE: CVE-2016-7944: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: October 12, 2016

Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.