CVE-2006-6103Out-of-bounds Write in X.org

10 documents8 sources
Severity
6.6MEDIUMNVD
EPSS
0.0%
top 86.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31
Latest updateMay 1

Description

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.

CVSS vector

AV:L/AC:M/C:C/I:C/A:CExploitability: 2.7 | Impact: 10.0

Affected Packages2 packages

Debianx.org/xorg-server< 2:1.1.1-15+3
NVDx.org/x.org4 versions+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-gvqv-r6pq-23cj: Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X2022-05-01
CVEList
CVE-2006-6103: Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X2007-01-09
OSV
CVE-2006-6103: Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X2006-12-31

📋Vendor Advisories

3
Ubuntu
X.org vulnerabilities2007-01-09
Red Hat
security flaw2006-01-09
Debian
CVE-2006-6103: xorg-server - Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.O...2006

💬Community

3
Bugzilla
CVE-2006-6103 security flaw2018-08-16
Bugzilla
CVE-2006-6101 Multiple XFree86 integer overflows (CVE-2006-6102, CVE-2006-6103)2006-12-07
Bugzilla
CVE-2006-6101 Multiple xorg-x11 integer overflows (CVE-2006-6102, CVE-2006-6103)2006-12-07
CVE-2006-6103 — Out-of-bounds Write in X.org | cvebase