An integer underflow flaw was found in the X.Org server when handling trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server. References: http://seclists.org/oss-sec/2013/q4/399 http://patchwork.freedesktop.org/patch/14769/
Note: On Further investigation it was discovered that there may be a possibility of arbitrary user controlled code execution in this particular flaw. Security impact and the cvss2 scoring has been adjusted accordingly.
Created xorg-x11-server tracking bugs for this issue: Affects: fedora-all [bug 1043751]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 Via RHSA-2013:1868 https://rhn.redhat.com/errata/RHSA-2013-1868.html