CVE-2013-2064Integer Overflow or Wraparound in Libxcb

Severity
6.8MEDIUMNVD
EPSS
0.9%
top 23.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15
Latest updateMay 14

Description

Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

NVDx/libxcb1.9+12
NVDopensuse/opensuse12.2, 12.3+1

Also affects: Debian Linux 6.0, 7.0, Fedora 19, Ubuntu Linux 10.04, 12.04, 12.10, 13.04

🔴Vulnerability Details

3
GHSA
GHSA-7f35-cmpc-qjfq: Integer overflow in X2022-05-14
OSV
CVE-2013-2064: Integer overflow in X2013-06-15
CVEList
CVE-2013-2064: Integer overflow in X2013-06-15

📋Vendor Advisories

3
Ubuntu
libxcb vulnerability2013-06-05
Red Hat
libxcb: Integer overflow leading to heap-based buffer overflow2013-05-23
Debian
CVE-2013-2064: libxcb - Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger all...2013

💬Community

2
Bugzilla
CVE-2013-2064 libxcb: Integer overflow leading to heap-based buffer overlow [fedora-all]2013-05-24
Bugzilla
CVE-2013-2064 libxcb: Integer overflow leading to heap-based buffer overflow2013-05-07
CVE-2013-2064 — Integer Overflow or Wraparound | cvebase