Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2013-1981

Back to Search

SUSE Linux Security Vulnerability: CVE-2013-1981

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
06/15/2013
Created
07/25/2018
Added
12/12/2013
Modified
07/04/2017

Description

Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.

Solution(s)

  • suse-upgrade-libx11
  • suse-upgrade-libx11-6
  • suse-upgrade-libx11-6-32bit
  • suse-upgrade-libx11-data
  • suse-upgrade-libx11-devel
  • suse-upgrade-libx11-devel-32bit
  • suse-upgrade-libx11-xcb1
  • suse-upgrade-libx11-xcb1-32bit
  • suse-upgrade-sle-sdk-release
  • suse-upgrade-xorg-x11
  • suse-upgrade-xorg-x11-devel
  • suse-upgrade-xorg-x11-devel-32bit
  • suse-upgrade-xorg-x11-devel-64bit
  • suse-upgrade-xorg-x11-doc
  • suse-upgrade-xorg-x11-fonts-100dpi
  • suse-upgrade-xorg-x11-fonts-75dpi
  • suse-upgrade-xorg-x11-fonts-cyrillic
  • suse-upgrade-xorg-x11-fonts-scalable
  • suse-upgrade-xorg-x11-fonts-syriac
  • suse-upgrade-xorg-x11-libs
  • suse-upgrade-xorg-x11-libs-32bit
  • suse-upgrade-xorg-x11-libs-64bit
  • suse-upgrade-xorg-x11-libs-x86
  • suse-upgrade-xorg-x11-libx11
  • suse-upgrade-xorg-x11-libx11-32bit
  • suse-upgrade-xorg-x11-libx11-devel
  • suse-upgrade-xorg-x11-libx11-devel-32bit
  • suse-upgrade-xorg-x11-libx11-x86
  • suse-upgrade-xorg-x11-man
  • suse-upgrade-xorg-x11-sdk
  • suse-upgrade-xorg-x11-server
  • suse-upgrade-xorg-x11-server-glx
  • suse-upgrade-xorg-x11-xnest
  • suse-upgrade-xorg-x11-xvfb
  • suse-upgrade-xorg-x11-xvnc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;