Do your applications use this vulnerable package?
Test your applications
Overview
Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.
References
- CVE Details
- Debian Security Tracker
- Fedora Security Update
- Fedora Security Update
- OSS security Advisory
- OSS security Advisory
- Security Focus
- Security Tracker
- Ubuntu CVE Tracker
- https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3
- https://lists.x.org/archives/xorg-announce/2016-October/002720.html
CVSS Score
9.8
low severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityHigh
- CVE
- CVE-2016-7951
- CWE
- CWE-125 CWE-190
- Snyk ID
- SNYK-UBUNTU1604-LIBXTST-310018
- Disclosed
- 13 Dec, 2016
- Published
- 13 Dec, 2016