{"id":"CVE-2016-7943","details":"The XListFonts function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving length fields, which trigger out-of-bounds write operations.","modified":"2026-05-18T05:48:40.475230731Z","published":"2016-12-13T20:59:07.520Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"25"}],"vendor_product":"fedoraproject:fedora","cpes":["cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/10/04/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/10/04/4"},{"type":"WEB","url":"http://www.securityfocus.com/bid/93362"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036945"},{"type":"WEB","url":"https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/"},{"type":"WEB","url":"https://lists.x.org/archives/xorg-announce/2016-October/002720.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3758-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3758-2/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201704-03"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mirror/libx11","events":[{"introduced":"0"},{"last_affected":"5a499ca7b064bf7e6a4fcc169f22862dce0c60c5"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.6.3"}],"cpe":"cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["libX11-1.6.3","libX11-1.6.2","libX11-1.6.1","libX11-1.6.0","libX11-1.5.99.902","libX11-1.5.99.901","libX11-1.5.0","libX11-1.4.99.902","libX11-1.4.99.901","libX11-1.4.99.1","libX11-1.4.4","libX11-1.4.3","libX11-1.4.2","libX11-1.4.1","libX11-1.4.0","libX11-1.3.99.903","libX11-1.3.99.902","libX11-1.3.99.901","libX11-1.3.4","libX11-1.3.3","libX11-1.3.2","libX11-1.3.1","libX11-1.3","libX11-1.2.99.901","libX11-1.2.2","libX11-1.2.1","libX11-1.2","libX11-1.1.99.2","libX11-1.1.4","libX11-1.1.3","libX11-1.1.2","XORG-6_99_99_904","MODULAR_COPY","XORG-6_99_99_903","XORG-6_8_99_903","XORG-6_99_99_902","XORG-6_8_99_902","XORG-6_99_99_901","XORG-6_8_99_901","XORG-6_99_99_900","XORG-6_8_99_900","XORG-6_8_99_15","XORG-6_8_99_14","XORG-6_8_99_13","XORG-6_8_99_10","XORG-6_8_99_9","XORG-6_8_99_7","XORG-6_8_99_6","XORG-6_8_1","XORG-6_7_99_903","XORG-6_7_99_902","XORG-6_7_99_2","XORG-6_7_99_1","XACE-SELINUX-MERGE","XORG-MAIN"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7943.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libx11","events":[{"introduced":"0"},{"last_affected":"5a499ca7b064bf7e6a4fcc169f22862dce0c60c5"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.6.3"}],"cpe":"cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["libX11-1.6.3","libX11-1.6.2","libX11-1.6.1","libX11-1.6.0","libX11-1.5.99.902","libX11-1.5.99.901","libX11-1.5.0","libX11-1.4.99.902","libX11-1.4.99.901","libX11-1.4.99.1","libX11-1.4.4","libX11-1.4.3","libX11-1.4.2","libX11-1.4.1","libX11-1.4.0","libX11-1.3.99.903","libX11-1.3.99.902","libX11-1.3.99.901","libX11-1.3.4","libX11-1.3.3","libX11-1.3.2","libX11-1.3.1","libX11-1.3","libX11-1.2.99.901","libX11-1.2.2","libX11-1.2.1","libX11-1.2","libX11-1.1.99.2","libX11-1.1.4","libX11-1.1.3","libX11-1.1.2","XORG-6_99_99_904","MODULAR_COPY","XORG-6_99_99_903","XORG-6_8_99_903","XORG-6_99_99_902","XORG-6_8_99_902","XORG-6_99_99_901","XORG-6_8_99_901","XORG-6_99_99_900","XORG-6_8_99_900","XORG-6_8_99_15","XORG-6_8_99_14","XORG-6_8_99_13","XORG-6_8_99_10","XORG-6_8_99_9","XORG-6_8_99_7","XORG-6_8_99_6","XORG-6_8_1","XORG-6_7_99_903","XORG-6_7_99_902","XORG-6_7_99_2","XORG-6_7_99_1","XACE-SELINUX-MERGE","XORG-MAIN"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7943.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}