CVE-2018-14598

An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
x.orglibx11
𝑥
≤ 1.6.5
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libx11
bullseye (security)
2:1.7.2-1+deb11u2
fixed
bullseye
2:1.7.2-1+deb11u2
fixed
wheezy
no-dsa
bookworm
2:1.8.4-2+deb12u2
fixed
bookworm (security)
2:1.8.4-2+deb12u2
fixed
trixie
2:1.8.7-1
fixed
sid
2:1.8.10-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libx11
bionic
Fixed 2:1.6.4-3ubuntu0.1
released
xenial
Fixed 2:1.6.3-1ubuntu2.1
released
trusty
Fixed 2:1.6.2-1ubuntu2.1
released