CVE-2018-14598

Name
CVE-2018-14598
Description
An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://lists.x.org/archives/xorg-announce/2018-August/002916.html
Patch https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2
Issue Tracking https://bugzilla.suse.com/show_bug.cgi?id=1102073
Mailing List http://www.openwall.com/lists/oss-security/2018/08/21/6
Third Party Advisory http://www.securitytracker.com/id/1041543
Third Party Advisory https://lists.debian.org/debian-lts-announce/2018/08/msg00030.html
Third Party Advisory https://usn.ubuntu.com/3758-2/
Third Party Advisory http://www.securityfocus.com/bid/105177
Third Party Advisory https://usn.ubuntu.com/3758-1/
Third Party Advisory https://security.gentoo.org/glsa/201811-01
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGARUV66TS5OOSLR5A76BUB7SDV6GO4F/
REDHAT https://access.redhat.com/errata/RHSA-2019:2079

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:* libx11 >= None <= 1.6.5

Vulnerable and fixed packages

Source package Branch Version Maintainer Status