Memory corruption vulnerability in libXt due to unchecked use of unchecked function pointers
|ID: oval:org.secpod.oval:def:20987||Date: (C)2014-09-02 (M)2017-04-25|
|Class: VULNERABILITY||Family: unix|
The host is installed with libXt before 1.1.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unchecked function pointers. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
|Red Hat Enterprise Linux 5|
|Red Hat Enterprise Linux 6|