Rapid7 Vulnerability & Exploit Database

Gentoo Linux: CVE-2017-16612: LibXcursor: User-assisted execution of arbitrary code

Back to Search

Gentoo Linux: CVE-2017-16612: LibXcursor: User-assisted execution of arbitrary code

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
12/01/2017
Created
07/25/2018
Added
01/08/2018
Modified
02/07/2018

Description

libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0.

Solution(s)

  • gentoo-linux-upgrade-x11-libs-libxcursor

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;