Secunia Security Advisory - Some vulnerabilities have been reported in X.Org X11, which potentially can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges.
d5d4187e0655cede45ccec9d2f41d2008fd616b6a14a6beb549cb429361b3699
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
X.Org X11 Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA24741
VERIFY ADVISORY:
http://secunia.com/advisories/24741/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information, Privilege escalation, DoS
WHERE:
Local system
SOFTWARE:
X Window System 11 (X11) 7.x
http://secunia.com/product/8806/
X Window System 11 (X11) 6.x
http://secunia.com/product/3913/
DESCRIPTION:
Some vulnerabilities have been reported in X.Org X11, which
potentially can be exploited by malicious, local users to disclose
sensitive information, cause a DoS (Denial of Service), and gain
escalated privileges.
1) An integer overflow exists within the parsing of BDF fonts. This
can be exploited to cause a heap-based buffer overflow via a
specially crafted BDF font.
Successful exploitation may allow the execution of arbitrary code
with escalated privileges.
2) An integer overflow exists within the parsing of the "fonts.dir"
fonts information file. This can be exploited to cause a heap-based
buffer overflow via a specially crafted fonts information file that
specifies an element count of more than 1,073,741,824 in the first
line.
Successful exploitation may allow the execution of arbitrary code
with escalated privileges.
3) An input validation error exists within the
"ProcXCMiscGetXIDList()" function of the XC-MISC extension. This can
be exploited to cause a stack-based (if the "alloca()" function is
available) or heap-based memory corruption by passing specially
crafted parameters to the function.
Successful exploitation may allow the execution of arbitrary code
with escalated privileges.
4) An integer overflow exists within the "XGetPixel()" function in
ImUtil.c. This can be exploited to cause a crash or disclose
potentially sensitive information by passing specially crafted
parameters to the function.
Vulnerabilities #1 and #2 are reported in X.Org X11R7.1,
vulnerability #3 is reported in X.org server version 7.1-1.1.0, and
vulnerability #4 is reported in libX11 version 1.0.3. Other versions
may also be affected.
SOLUTION:
Fixed in the source code management repository.
PROVIDED AND/OR DISCOVERED BY:
1, 2) Greg MacManus, iDefense Labs
3) Sean Larsson, iDefense Labs
4) Sami Liedes
ORIGINAL ADVISORY:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------