Show plain JSON{"affected_release": [{"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libdmx-0:1.1.3-3.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libX11-0:1.6.0-2.2.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libxcb-0:1.9.1-2.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXcursor-0:1.1.14-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXext-0:1.3.2-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXfixes-0:5.0.1-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXi-0:1.7.2-2.2.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXinerama-0:1.1.3-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXp-0:1.0.2-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXrandr-0:1.4.1-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXrender-0:0.9.8-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXres-0:1.0.7-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXt-0:1.1.4-6.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXtst-0:1.2.2-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXv-0:1.0.9-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXvMC-0:1.0.8-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXxf86dga-0:1.1.4-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "libXxf86vm-0:1.1.3-2.1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xcb-proto-0:1.8-3.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xkeyboard-config-0:2.11-1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xorg-x11-proto-devel-0:7.7-9.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}, {"advisory": "RHSA-2014:1436", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "xorg-x11-xtrans-devel-0:1.3.4-1.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2014-10-13T00:00:00Z"}], "bugzilla": {"description": "libXxf86dga: Multiple integer overflows leading to heap-based buffer overflows", "id": "959072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959072"}, "csaw": false, "cvss": {"cvss_base_score": "4.3", "cvss_scoring_vector": "AV:A/AC:H/Au:N/C:P/I:P/A:P", "status": "verified"}, "cwe": "CWE-190->CWE-122", "details": ["Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions."], "name": "CVE-2013-1991", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Will not fix", "package_name": "libXxf86dga", "product_name": "Red Hat Enterprise Linux 5"}], "public_date": "2013-05-23T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2013-1991\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-1991\nhttp://www.x.org/wiki/Development/Security/Advisory-2013-05-23"], "statement": "This issue affects the libXxf86dga package in Red Hat Enterprise Linux 5. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not planned to be fixed in Red Hat Enterprise Linux 5 as it is now in Production 3 Phase of the support and maintenance life cycle: https://access.redhat.com/support/policy/updates/errata/", "threat_severity": "Moderate"}