Summary
Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 2:1.1.0-3+squeeze1.
For the stable distribution (wheezy), this problem has been fixed in version 2:1.2.1-1+deb7u1.
For the unstable distribution (sid), this problem has been fixed in version 2:1.2.1-1+deb7u1.
We recommend that you upgrade your libxtst packages.
Insight
libXtst provides an X Window System client interface to the 'Record' extension to the X protocol.
Affected
libxtst on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-2063 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities