2.1
CVSSv2

CVE-2006-1526

Published: 02/05/2006 Updated: 18/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows malicious users to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&" instead of a "*" operator. NOTE: the subject line of the original announcement used an incorrect CVE number for this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x.org x11r6 6.9

x.org x11r6 6.8

x.org x11r6 6.8.1

x.org x11r6 6.7.0

Vendor Advisories

Debian Bug report logs - #378464 xserver-xorg: CVE-2006-1526 Package: xserver-xorg; Maintainer for xserver-xorg is Debian X Strike Force <debian-x@listsdebianorg>; Source for xserver-xorg is src:xorg (PTS, buildd, popcon) Reported by: Helge Kreutzmann <debian@helgefjellde> Date: Sun, 16 Jul 2006 14:48:26 UTC Seve ...
The Render extension of the Xorg server incorrectly calculated the size of a memory buffer, which led to a buffer overflow A local attacker could exploit this to crash the X server or even execute arbitrary code with root privileges ...