Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6407-1

Ubuntu Security Notice 6407-1 - Gregory James Duck discovered that libx11 incorrectly handled certain keyboard symbols. If a user were tricked into connecting to a malicious X server, a remote attacker could use this issue to cause libx11 to crash, resulting in a denial of service, or possibly execute arbitrary code. Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service.

Packet Storm
#vulnerability#ubuntu#dos
==========================================================================Ubuntu Security Notice USN-6407-1October 03, 2023libx11 vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 23.04- Ubuntu 22.04 LTS- Ubuntu 20.04 LTSSummary:Several security issues were fixed in libx11.Software Description:- libx11: X11 client-side libraryDetails:Gregory James Duck discovered that libx11 incorrectly handled certainkeyboard symbols. If a user were tricked into connecting to a malicious Xserver, a remote attacker could use this issue to cause libx11 to crash,resulting in a denial of service, or possibly execute arbitrary code.(CVE-2023-43785)Yair Mizrahi discovered that libx11 incorrectly handled certain malformedXPM image files. If a user were tricked into opening a specially craftedXPM image file, a remote attacker could possibly use this issue to consumememory, leading to a denial of service. (CVE-2023-43786)Yair Mizrahi discovered that libx11 incorrectly handled certain malformedXPM image files. If a user were tricked into opening a specially craftedXPM image file, a remote attacker could use this issue to cause libx11 tocrash, leading to a denial of service, or possibly execute arbitrary code.(CVE-2023-43787)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 23.04:   libx11-6                        2:1.8.4-2ubuntu0.3Ubuntu 22.04 LTS:   libx11-6                        2:1.7.5-1ubuntu0.3Ubuntu 20.04 LTS:   libx11-6                        2:1.6.9-2ubuntu1.6After a standard system update you need to reboot your computer to make allthe necessary changes.References:   https://ubuntu.com/security/notices/USN-6407-1   CVE-2023-43785, CVE-2023-43786, CVE-2023-43787Package Information:   https://launchpad.net/ubuntu/+source/libx11/2:1.8.4-2ubuntu0.3   https://launchpad.net/ubuntu/+source/libx11/2:1.7.5-1ubuntu0.3   https://launchpad.net/ubuntu/+source/libx11/2:1.6.9-2ubuntu1.6

Related news

Gentoo Linux Security Advisory 202407-21

Gentoo Linux Security Advisory 202407-21 - Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service. Versions greater than or equal to 1.8.7 are affected.

CVE-2023-48660: DSA-2023-443: Dell PowerMaxOS 5978, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM Secu

Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.

Ubuntu Security Notice USN-6408-2

Ubuntu Security Notice 6408-2 - USN-6408-1 fixed several vulnerabilities in libXpm. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Yair Mizrahi discovered that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service.

CVE-2023-43787: cve-details

A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.

CVE-2023-43786: cve-details

A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.

CVE-2023-43785: Invalid Bug ID

A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.

Debian Security Advisory 5517-1

Debian Linux Security Advisory 5517-1 - Multiple security vulnerabilities were discovered in libx11, the X11 client-side library, which may result in denial of service or the execution of arbitrary code.

Ubuntu Security Notice USN-6408-1

Ubuntu Security Notice 6408-1 - Yair Mizrahi discovered that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. Yair Mizrahi discovered that libXpm incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could use this issue to cause libXpm to crash, leading to a denial of service, or possibly execute arbitrary code.

Packet Storm: Latest News

TOR Virtual Network Tunneling Tool 0.4.8.13