An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-08-24 12:29
Updated : 2019-08-06 10:15
NVD link : CVE-2018-14598
Mitre link : CVE-2018-14598
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
fedoraproject
- fedora
x.org
- libx11