what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 24741

Secunia Security Advisory 24741
Posted Apr 4, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in X.Org X11, which potentially can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
SHA-256 | d5d4187e0655cede45ccec9d2f41d2008fd616b6a14a6beb549cb429361b3699

Secunia Security Advisory 24741

Change Mirror Download


----------------------------------------------------------------------

Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/

----------------------------------------------------------------------

TITLE:
X.Org X11 Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA24741

VERIFY ADVISORY:
http://secunia.com/advisories/24741/

CRITICAL:
Less critical

IMPACT:
Exposure of sensitive information, Privilege escalation, DoS

WHERE:
Local system

SOFTWARE:
X Window System 11 (X11) 7.x
http://secunia.com/product/8806/
X Window System 11 (X11) 6.x
http://secunia.com/product/3913/

DESCRIPTION:
Some vulnerabilities have been reported in X.Org X11, which
potentially can be exploited by malicious, local users to disclose
sensitive information, cause a DoS (Denial of Service), and gain
escalated privileges.

1) An integer overflow exists within the parsing of BDF fonts. This
can be exploited to cause a heap-based buffer overflow via a
specially crafted BDF font.

Successful exploitation may allow the execution of arbitrary code
with escalated privileges.

2) An integer overflow exists within the parsing of the "fonts.dir"
fonts information file. This can be exploited to cause a heap-based
buffer overflow via a specially crafted fonts information file that
specifies an element count of more than 1,073,741,824 in the first
line.

Successful exploitation may allow the execution of arbitrary code
with escalated privileges.

3) An input validation error exists within the
"ProcXCMiscGetXIDList()" function of the XC-MISC extension. This can
be exploited to cause a stack-based (if the "alloca()" function is
available) or heap-based memory corruption by passing specially
crafted parameters to the function.

Successful exploitation may allow the execution of arbitrary code
with escalated privileges.

4) An integer overflow exists within the "XGetPixel()" function in
ImUtil.c. This can be exploited to cause a crash or disclose
potentially sensitive information by passing specially crafted
parameters to the function.

Vulnerabilities #1 and #2 are reported in X.Org X11R7.1,
vulnerability #3 is reported in X.org server version 7.1-1.1.0, and
vulnerability #4 is reported in libX11 version 1.0.3. Other versions
may also be affected.

SOLUTION:
Fixed in the source code management repository.

PROVIDED AND/OR DISCOVERED BY:
1, 2) Greg MacManus, iDefense Labs
3) Sean Larsson, iDefense Labs
4) Sami Liedes

ORIGINAL ADVISORY:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close