[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.5] libXfixes: Integer overflow on illegal server response (CVE-2016-7944)

ID: oval:org.secpod.oval:def:1800825Date: (C)2018-03-28   (M)2023-11-10
Class: PATCHFamily: unix




When receiving a response from the server protocol data is not validated sufficiently. The 32 bit field "rep.length" is not checked for validity, which allows an integer overflow on 32 bit systems. A malicious server could send INT_MAX as length, which gets multiplied by the size of XRectangle. In that case the client won"t read the whole data from server, getting out of sync. Affected versions libXfixes Fixed In Version libXfixes 5.0.3

Platform:
Alpine Linux 3.5
Product:
libxfixes
Reference:
6307
CVE-2016-7944
CVE    1
CVE-2016-7944
CPE    2
cpe:/o:alpinelinux:alpine_linux:3.5
cpe:/a:x:libxfixes

© SecPod Technologies