Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2013-2005

Back to Search

SUSE Linux Security Vulnerability: CVE-2013-2005

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
06/15/2013
Created
07/25/2018
Added
12/12/2013
Modified
07/04/2017

Description

X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.

Solution(s)

  • suse-upgrade-libxt
  • suse-upgrade-libxt-devel
  • suse-upgrade-libxt-devel-32bit
  • suse-upgrade-libxt6
  • suse-upgrade-libxt6-32bit
  • suse-upgrade-sle-sdk-release
  • suse-upgrade-xorg-x11
  • suse-upgrade-xorg-x11-devel
  • suse-upgrade-xorg-x11-devel-32bit
  • suse-upgrade-xorg-x11-devel-64bit
  • suse-upgrade-xorg-x11-doc
  • suse-upgrade-xorg-x11-fonts-100dpi
  • suse-upgrade-xorg-x11-fonts-75dpi
  • suse-upgrade-xorg-x11-fonts-cyrillic
  • suse-upgrade-xorg-x11-fonts-scalable
  • suse-upgrade-xorg-x11-fonts-syriac
  • suse-upgrade-xorg-x11-libs
  • suse-upgrade-xorg-x11-libs-32bit
  • suse-upgrade-xorg-x11-libs-64bit
  • suse-upgrade-xorg-x11-libs-x86
  • suse-upgrade-xorg-x11-libxt
  • suse-upgrade-xorg-x11-libxt-32bit
  • suse-upgrade-xorg-x11-libxt-devel
  • suse-upgrade-xorg-x11-libxt-devel-32bit
  • suse-upgrade-xorg-x11-libxt-x86
  • suse-upgrade-xorg-x11-man
  • suse-upgrade-xorg-x11-sdk
  • suse-upgrade-xorg-x11-server
  • suse-upgrade-xorg-x11-server-glx
  • suse-upgrade-xorg-x11-xnest
  • suse-upgrade-xorg-x11-xvfb
  • suse-upgrade-xorg-x11-xvnc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;