Executive Summary
Summary | |
---|---|
Title | New xfree86 packages fix multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-443 | First vendor Publication | 2004-02-19 |
Vendor | Debian | Last vendor Modification | 2004-02-19 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A number of vulnerabilities have been discovered in XFree86: CAN-2004-0083: Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CAN-2004-0084. CAN-2004-0084: Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CAN-2004-0083. CAN-2004-0106: Miscellaneous additional flaws in XFree86's handling of font files. CAN-2003-0690: xdm does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module. CAN-2004-0093, CAN-2004-0094: Denial-of-service attacks against the X server by clients using the GLX extension and Direct Rendering Infrastructure are possible due to unchecked client data (out-of-bounds array indexes [CAN-2004-0093] and integer signedness errors [CAN-2004-0094]). Exploitation of CAN-2004-0083, CAN-2004-0084, CAN-2004-0106, CAN-2004-0093 and CAN-2004-0094 would require a connection to the X server. By default, display managers in Debian start the X server with a configuration which only accepts local connections, but if the configuration is changed to allow remote connections, or X servers are started by other means, then these bugs could be exploited remotely. Since the X server usually runs with root privileges, these bugs could potentially be exploited to gain root privileges. No attack vector for CAN-2003-0690 is known at this time. For the stable distribution (woody) these problems have been fixed in version 4.1.0-16woody3. For the unstable distribution (sid) these problems have been fixed in version 4.3.0-2. We recommend that you update your xfree86 package. |
Original Source
Url : http://www.debian.org/security/2004/dsa-443 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:193 | |||
Oval ID: | oval:org.mitre.oval:def:193 | ||
Title: | KDM pam_setcred Privilege Escalation Vulnerability | ||
Description: | KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0690 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | KDM |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:806 | |||
Oval ID: | oval:org.mitre.oval:def:806 | ||
Title: | Red Hat XFree86 Buffer Overflow in ReadFontAlias | ||
Description: | Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0083 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | XFree86 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:807 | |||
Oval ID: | oval:org.mitre.oval:def:807 | ||
Title: | Red Hat XFree86 Buffer Overflow in ReadFontAlias II | ||
Description: | Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0084 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | XFree86 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:809 | |||
Oval ID: | oval:org.mitre.oval:def:809 | ||
Title: | XFree86 Font File Handling Vulnerability | ||
Description: | Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0106 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | XFree86 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:830 | |||
Oval ID: | oval:org.mitre.oval:def:830 | ||
Title: | XFree86 Buffer Overflow in dirfile | ||
Description: | Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0083 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | XFree86 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:831 | |||
Oval ID: | oval:org.mitre.oval:def:831 | ||
Title: | XFree86 Buffer Overflow in CopyISOLatin1Lowered Function | ||
Description: | Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0084 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | XFree86 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:832 | |||
Oval ID: | oval:org.mitre.oval:def:832 | ||
Title: | XFree86 Improper Handling of Font Files | ||
Description: | Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0106 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | XFree86 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-05-05 | Name : HP-UX Update for XFree86 HPSBUX01018 File : nvt/gb_hp_ux_HPSBUX01018.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200311-01 (kdebase) File : nvt/glsa_200311_01.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200402-02 (200402-02) File : nvt/glsa_200402_02.nasl |
2008-09-04 | Name : FreeBSD Ports: XFree86-Server File : nvt/freebsd_XFree86-Server.nasl |
2008-09-04 | Name : FreeBSD Ports: linux_base File : nvt/freebsd_linux_base.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 388-1 (kdebase) File : nvt/deb_388_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 443-1 (xfree86) File : nvt/deb_443_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2004-043-02 XFree86 security update File : nvt/esoft_slk_ssa_2004_043_02.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
8341 | XFree86 CopyISOLatin1Lowered Function Overflow A local overflow exists in XFree86. The CopyISOLatin1Lowered() function fails to validate the length of the font_name buffer when reading the 'font.alias' file. With a specially crafted malformed file, an attacker can execute arbitrary code resulting in a loss of integrity |
6883 | XFree86 Multiple Unspecified Font File Flaws XFree86 contains a flaw related to the parsing of the font files that may allow an attacker to execute arbitrary code. No further details have been provided. |
6881 | XFree86 GLX/DRI Integer Signedness Error Privilege Escalation |
6880 | XFree86 GLX/DRI Out-of-bounds Array Index Privilege Escalation |
4773 | KDE KDM pam_setcred() Function Error Condition Privilege Escalation |
3905 | XFree86 dirfile.c ReadFontAlias Function Overflow A local overflow exists in XFree86. The 'ReadFontAlias()' function fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted request, a malicious user can cause arbitrary code execution resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_3837f4625d6b11d880e30020ed76ef5a.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-043-02.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_bf2e7483d3fa440d8c6e8f1f2f018818.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-388.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-443.nasl - Type : ACT_GATHER_INFO |
2004-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200402-02.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-091.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-118.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-012.nasl - Type : ACT_GATHER_INFO |
2004-07-25 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2004_006.nasl - Type : ACT_GATHER_INFO |
2004-07-23 | Name : The remote Fedora Core host is missing a security update. File : fedora_2004-069.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-270.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-289.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-060.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-061.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-152.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:06 |
|