An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T09:29:51.690Z
Reserved: 2018-07-26T00:00:00
Link: CVE-2018-14598

No data.

Status : Modified
Published: 2018-08-24T19:29:01.377
Modified: 2024-11-21T03:49:22.760
Link: CVE-2018-14598
