Vulnerability Name: | CVE-2006-1526 (CCN-26200) | ||||||||||||||||
Assigned: | 2006-05-02 | ||||||||||||||||
Published: | 2006-05-02 | ||||||||||||||||
Updated: | 2018-10-18 | ||||||||||||||||
Summary: | Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&" instead of a "*" operator. Note: the subject line of the original announcement used an incorrect CVE number for this issue. | ||||||||||||||||
CVSS v3 Severity: | 2.8 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-1526 Source: CCN Type: X.Org Mailing List, Tue May 2 07:05:21 PDT 2006 [CVE-2006-1525] X.Org security advisory: Buffer overflow in the Xrender extension Source: MLIST Type: Patch [xorg] 20060502 [CVE-2006-1525] X.Org security advisory: Buffer overflow in the Xrender extension Source: CCN Type: RHSA-2006-0451 xorg-x11 security update Source: CCN Type: SA19900 X.Org X11 Render Extension Buffer Overflow Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 19900 Source: SECUNIA Type: Patch, Vendor Advisory 19915 Source: SECUNIA Type: Patch, Vendor Advisory 19916 Source: SECUNIA Type: Patch, Vendor Advisory 19921 Source: SECUNIA Type: Patch, Vendor Advisory 19943 Source: SECUNIA Type: Patch, Vendor Advisory 19951 Source: SECUNIA Type: Patch, Vendor Advisory 19956 Source: SECUNIA Type: UNKNOWN 19983 Source: CCN Type: SECTRACK ID: 1016018 X Server Buffer Overflow Render Extension Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1016018 Source: CCN Type: Sun Alert ID: 102339 Security Vulnerability in the Xorg(1) Version of the Render Extension Source: SUNALERT Type: UNKNOWN 102339 Source: CCN Type: ASA-2006-097 xorg-x11 security update (RHSA-2006-0451) Source: CCN Type: GLSA-200605-02 X.Org: Buffer overflow in XRender extension Source: GENTOO Type: Patch, Vendor Advisory GLSA-200605-02 Source: CCN Type: US-CERT VU#633257 X.Org server buffer overflow in Xrender extension Source: CERT-VN Type: US Government Resource VU#633257 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:081 Source: SUSE Type: Patch, Vendor Advisory SUSE-SA:2006:023 Source: OPENBSD Type: UNKNOWN [3.8] 007: SECURITY FIX: May 2, 2006 Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0451 Source: FEDORA Type: UNKNOWN FLSA:190777 Source: BID Type: UNKNOWN 17795 Source: CCN Type: BID-17795 X.Org XRender Extension Buffer Overflow Vulnerability Source: TRUSTIX Type: UNKNOWN 2006-0024 Source: CCN Type: USN-280-1 X.org server vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-1617 Source: CCN Type: X.Org Foundation Web site X.Org Wiki - Home Source: CONFIRM Type: UNKNOWN https://bugs.freedesktop.org/show_bug.cgi?id=6642 Source: XF Type: UNKNOWN xorg-xrender-bo(26200) Source: XF Type: UNKNOWN xorg-xrender-bo(26200) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9929 Source: UBUNTU Type: UNKNOWN USN-280-1 Source: SUSE Type: SUSE-SA:2006:023 xorg-x11-server buffer overflow | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |