CVE-2013-4396
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
10/10/2013
Last modified:
11/04/2025
Description
Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:x:x.org_x11:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:6.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:x.org_x11:7.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00060.html
- http://lists.x.org/archives/xorg-announce/2013-October/002332.html
- http://openwall.com/lists/oss-security/2013/10/08/6
- http://rhn.redhat.com/errata/RHSA-2013-1426.html
- http://www.debian.org/security/2013/dsa-2784
- http://www.securityfocus.com/bid/62892
- http://www.ubuntu.com/usn/USN-1990-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1014561
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00060.html
- http://lists.x.org/archives/xorg-announce/2013-October/002332.html
- http://openwall.com/lists/oss-security/2013/10/08/6
- http://rhn.redhat.com/errata/RHSA-2013-1426.html
- http://www.debian.org/security/2013/dsa-2784
- http://www.securityfocus.com/bid/62892
- http://www.ubuntu.com/usn/USN-1990-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1014561



