7.5
CVSSv2

CVE-2016-7944

Published: 13/12/2016 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in X.org libXfixes prior to 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x.org libxfixes

fedoraproject fedora 25

fedoraproject fedora 24

Vendor Advisories

Debian Bug report logs - #840442 libxfixes: CVE-2016-7944 Package: src:libxfixes; Maintainer for src:libxfixes is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 11 Oct 2016 15:48:02 UTC Severity: important Tags: patch, security, upstream Found in v ...
Integer overflow in Xorg libXfixes before 503 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync ...