{"api_version":"1","generated_at":"2026-04-22T23:51:55+00:00","cve":"CVE-2006-6103","urls":{"html":"https://cve.report/CVE-2006-6103","api":"https://cve.report/api/cve/CVE-2006-6103.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-6103","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-6103"},"summary":{"title":"CVE-2006-6103","description":"Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2006-12-31 05:00:00","updated_at":"2017-10-11 01:31:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm","refsource":"CONFIRM","tags":[],"title":"ASA-2007-066 (RHSA-2007-0002)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2007_08_x.html","name":"SUSE-SA:2007:008","refsource":"SUSE","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://osvdb.org/32086","name":"32086","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html","name":"RHSA-2007:0002","refsource":"REDHAT","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200701-25.xml","name":"GLSA-200701-25","refsource":"GENTOO","tags":[],"title":"Gentoo Linux Documentation\n--\n  X.Org X server: Multiple vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25802","name":"25802","refsource":"SECUNIA","tags":[],"title":"HP-UX update for Xserver - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/0109","name":"ADV-2007-0109","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23684","name":"23684","refsource":"SECUNIA","tags":[],"title":"XFree86 \"DBE\" and \"Render\" Extensions Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23698","name":"23698","refsource":"SECUNIA","tags":[],"title":"Ubuntu update for xserver-xorg-core - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011","name":"oval:org.mitre.oval:def:11011","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23966","name":"23966","refsource":"SECUNIA","tags":[],"title":"Gentoo update for xorg-server - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23758","name":"23758","refsource":"SECUNIA","tags":[],"title":"SUSE update for XFree86 and Xorg - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/0108","name":"ADV-2007-0108","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555","name":"SSA:2007-066-02","refsource":"SLACKWARE","tags":[],"title":"The Slackware Linux Project: Slackware Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23789","name":"23789","refsource":"SECUNIA","tags":[],"title":"Debian update for xfree86 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23633","name":"23633","refsource":"SECUNIA","tags":[],"title":"Red Hat update for xorg-x11 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465","name":"20070109 Multiple Vendor X Server DBE Extension ProcDbeSwapBuffers Memory Corruption Vulnerability","refsource":"IDEFENSE","tags":["Patch","Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm","refsource":"CONFIRM","tags":[],"title":"ASA-2007-074 (SUN 102803)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/0669","name":"ADV-2007-0669","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24247","name":"24247","refsource":"SECUNIA","tags":[],"title":"Avaya CMS xfs / X Render and DBE Extensions Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005","name":"MDKSA-2007:005","refsource":"MANDRIVA","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23670","name":"23670","refsource":"SECUNIA","tags":[],"title":"X.Org X11 \"DBE\" and \"Render\" Extensions Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24210","name":"24210","refsource":"SECUNIA","tags":[],"title":"Avaya Products XFree86 \"DBE\" and \"Render\" Extensions Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23705","name":"23705","refsource":"SECUNIA","tags":[],"title":"Mandriva update for xorg-x11 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html","name":"[x-org announce] 20070109 X.Org Security Advisory: multiple integer overflows in dbe and render extensions","refsource":"MLIST","tags":["Patch","Vendor Advisory"],"title":"[ANNOUNCE] X.Org Security Advisory: multiple integer overflows in\n dbe and render extensions","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678","name":"SSRT071295","refsource":"HP","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.vupen.com/english/advisories/2007/0589","name":"ADV-2007-0589","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/21968","name":"21968","refsource":"BID","tags":[],"title":"X.Org DBE And Render Extensions Multiple Local Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2007/2233","name":"ADV-2007-2233","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://issues.rpath.com/browse/RPL-920","name":"https://issues.rpath.com/browse/RPL-920","refsource":"CONFIRM","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html","name":"RHSA-2007:0003","refsource":"REDHAT","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24168","name":"24168","refsource":"SECUNIA","tags":[],"title":"Sun Solaris X Font Server / X Render and DBE Extensions Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24401","name":"24401","refsource":"SECUNIA","tags":[],"title":"Slackware update for x11 - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc","name":"NetBSD-SA2007-002","refsource":"NETBSD","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-403-1","name":"USN-403-1","refsource":"UBUNTU","tags":[],"title":"USN-403-1: X.org vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31379","name":"xorg-xserver-dbe-swap-overflow(31379)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23689","name":"23689","refsource":"SECUNIA","tags":[],"title":"rPath update for xorg-x11 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2007/dsa-1249","name":"DSA-1249","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-1249-1 xfree86","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017495","name":"1017495","refsource":"SECTRACK","tags":[],"title":"X Memory Corruption Errors in Render and DBE Extensions Let Local Users Gain Root Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1","name":"102803","refsource":"SUNALERT","tags":[],"title":"#102803: Multiple Integer Overflow Vulnerabilities in the X Font Server (xfs(1)) and the X Render and DBE Extensions","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-6103","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6103","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"6.8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"6.9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"6.8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"6.9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xfree86_project","cpe5":"xfree86","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"6103","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xfree86_project","cpe5":"xfree86","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2006-6103","organization":"Red Hat","lastmodified":"2007-03-14","contributor":"Mark J Cox","statementText":"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.","cve_year":"2006","cve_id":"6103","crc32":"e4ada83e"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2006-6103","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc","refsource":"MISC","name":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678","refsource":"MISC","name":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678"},{"url":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html","refsource":"MISC","name":"http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html"},{"url":"http://secunia.com/advisories/23633","refsource":"MISC","name":"http://secunia.com/advisories/23633"},{"url":"http://secunia.com/advisories/23670","refsource":"MISC","name":"http://secunia.com/advisories/23670"},{"url":"http://secunia.com/advisories/23684","refsource":"MISC","name":"http://secunia.com/advisories/23684"},{"url":"http://secunia.com/advisories/23689","refsource":"MISC","name":"http://secunia.com/advisories/23689"},{"url":"http://secunia.com/advisories/23698","refsource":"MISC","name":"http://secunia.com/advisories/23698"},{"url":"http://secunia.com/advisories/23705","refsource":"MISC","name":"http://secunia.com/advisories/23705"},{"url":"http://secunia.com/advisories/23758","refsource":"MISC","name":"http://secunia.com/advisories/23758"},{"url":"http://secunia.com/advisories/23789","refsource":"MISC","name":"http://secunia.com/advisories/23789"},{"url":"http://secunia.com/advisories/23966","refsource":"MISC","name":"http://secunia.com/advisories/23966"},{"url":"http://secunia.com/advisories/24168","refsource":"MISC","name":"http://secunia.com/advisories/24168"},{"url":"http://secunia.com/advisories/24210","refsource":"MISC","name":"http://secunia.com/advisories/24210"},{"url":"http://secunia.com/advisories/24247","refsource":"MISC","name":"http://secunia.com/advisories/24247"},{"url":"http://secunia.com/advisories/24401","refsource":"MISC","name":"http://secunia.com/advisories/24401"},{"url":"http://secunia.com/advisories/25802","refsource":"MISC","name":"http://secunia.com/advisories/25802"},{"url":"http://security.gentoo.org/glsa/glsa-200701-25.xml","refsource":"MISC","name":"http://security.gentoo.org/glsa/glsa-200701-25.xml"},{"url":"http://securitytracker.com/id?1017495","refsource":"MISC","name":"http://securitytracker.com/id?1017495"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555","refsource":"MISC","name":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1","refsource":"MISC","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm","refsource":"MISC","name":"http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm","refsource":"MISC","name":"http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:005"},{"url":"http://www.novell.com/linux/security/advisories/2007_08_x.html","refsource":"MISC","name":"http://www.novell.com/linux/security/advisories/2007_08_x.html"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0002.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2007-0002.html"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0003.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2007-0003.html"},{"url":"http://www.securityfocus.com/bid/21968","refsource":"MISC","name":"http://www.securityfocus.com/bid/21968"},{"url":"http://www.ubuntu.com/usn/usn-403-1","refsource":"MISC","name":"http://www.ubuntu.com/usn/usn-403-1"},{"url":"http://www.vupen.com/english/advisories/2007/0108","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/0108"},{"url":"http://www.vupen.com/english/advisories/2007/0109","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/0109"},{"url":"http://www.vupen.com/english/advisories/2007/0589","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/0589"},{"url":"http://www.vupen.com/english/advisories/2007/0669","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/0669"},{"url":"http://www.vupen.com/english/advisories/2007/2233","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/2233"},{"url":"https://issues.rpath.com/browse/RPL-920","refsource":"MISC","name":"https://issues.rpath.com/browse/RPL-920"},{"url":"https://www.debian.org/security/2007/dsa-1249","refsource":"MISC","name":"https://www.debian.org/security/2007/dsa-1249"},{"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465","refsource":"MISC","name":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465"},{"url":"http://osvdb.org/32086","refsource":"MISC","name":"http://osvdb.org/32086"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31379","refsource":"MISC","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31379"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011"}]}},"nvd":{"publishedDate":"2006-12-31 05:00:00","lastModifiedDate":"2017-10-11 01:31:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:S/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":6.6},"severity":"MEDIUM","exploitabilityScore":2.7,"impactScore":10,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"6103","Ordinal":"21451","Title":"CVE-2006-6103","CVE":"CVE-2006-6103","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"6103","Ordinal":"1","NoteData":"Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"6103","Ordinal":"2","NoteData":"2007-01-09","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"6103","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}