[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.4] libXfixes: Integer overflow on illegal server response (CVE-2016-7944)

ID: oval:org.secpod.oval:def:1800740Date: (C)2018-03-29   (M)2023-11-10
Class: PATCHFamily: unix




When receiving a response from the server protocol data is not validated sufficiently. The 32 bit field "rep.length" is not checked for validity, which allows an integer overflow on 32 bit systems. A malicious server could send INT_MAX as length, which gets multiplied by the size of XRectangle. In that case the client won"t read the whole data from server, getting out of sync. Affected versions : libXfixes Fixed In Version: libXfixes 5.0.3

Platform:
Alpine Linux 3.4
Product:
libxfixes
Reference:
6308
CVE-2016-7944
CVE    1
CVE-2016-7944
CPE    2
cpe:/o:alpinelinux:alpine_linux:3.4
cpe:/a:x:libxfixes

© SecPod Technologies