SB2013052416 - Input validation error in libxp (Alpine package)
Published: May 24, 2013
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2013-2062)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=04fca7445c2068e588b79b32e01639ef1a0de1b6
- https://git.alpinelinux.org/aports/commit/?id=084e5c9a2e845e3a2d6c8a089a3a078bf8f720ae
- https://git.alpinelinux.org/aports/commit/?id=2010f65d8cec7910f3adaacca95203a06ae98c4a
- https://git.alpinelinux.org/aports/commit/?id=466e0a66822fb96f08c5994ab9fa41ae63cdc513
- https://git.alpinelinux.org/aports/commit/?id=596f76568714ab83fed8fef00c69f6493e6996e3