CVE-2017-12179
24.01.2018, 15:29
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.Enginsight
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
x.org | xorg-server | 𝑥 < 1.19.5 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||
---|---|---|---|---|---|---|---|
xorg |
| ||||||
xorg-hwe-16.04 |
| ||||||
xorg-server |
| ||||||
xorg-server-hwe-16.04 |
| ||||||
xorg-server-lts-utopic |
| ||||||
xorg-server-lts-vivid |
| ||||||
xorg-server-lts-wily |
| ||||||
xorg-server-lts-xenial |
|
Common Weakness Enumeration
- CWE-391 - Unchecked Error Condition[PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES AND CONSIDER CWE-252, CWE-248, OR CWE-1069.] Ignoring exceptions and other error conditions may allow an attacker to induce unexpected behavior unnoticed.
- CWE-190 - Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
References