Executive Summary

Summary
Title New xfree86 packages fix multiple vulnerabilities
Informations
Name DSA-443 First vendor Publication 2004-02-19
Vendor Debian Last vendor Modification 2004-02-19
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A number of vulnerabilities have been discovered in XFree86:

CAN-2004-0083: Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CAN-2004-0084.

CAN-2004-0084: Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CAN-2004-0083.

CAN-2004-0106: Miscellaneous additional flaws in XFree86's handling of font files.

CAN-2003-0690: xdm does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.

CAN-2004-0093, CAN-2004-0094: Denial-of-service attacks against the X server by clients using the GLX extension and Direct Rendering Infrastructure are possible due to unchecked client data (out-of-bounds array indexes [CAN-2004-0093] and integer signedness errors [CAN-2004-0094]).

Exploitation of CAN-2004-0083, CAN-2004-0084, CAN-2004-0106, CAN-2004-0093 and CAN-2004-0094 would require a connection to the X server. By default, display managers in Debian start the X server with a configuration which only accepts local connections, but if the configuration is changed to allow remote connections, or X servers are started by other means, then these bugs could be exploited remotely. Since the X server usually runs with root privileges, these bugs could potentially be exploited to gain root privileges.

No attack vector for CAN-2003-0690 is known at this time.

For the stable distribution (woody) these problems have been fixed in version 4.1.0-16woody3.

For the unstable distribution (sid) these problems have been fixed in version 4.3.0-2.

We recommend that you update your xfree86 package.

Original Source

Url : http://www.debian.org/security/2004/dsa-443

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10405
 
Oval ID: oval:org.mitre.oval:def:10405
Title: Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.
Description: Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0084
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11111
 
Oval ID: oval:org.mitre.oval:def:11111
Title: Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.
Description: Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0106
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:193
 
Oval ID: oval:org.mitre.oval:def:193
Title: KDM pam_setcred Privilege Escalation Vulnerability
Description: KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Family: unix Class: vulnerability
Reference(s): CVE-2003-0690
Version: 2
Platform(s): Red Hat Linux 9
Product(s): KDM
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:806
 
Oval ID: oval:org.mitre.oval:def:806
Title: Red Hat XFree86 Buffer Overflow in ReadFontAlias
Description: Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0083
Version: 2
Platform(s): Red Hat Linux 9
Product(s): XFree86
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:807
 
Oval ID: oval:org.mitre.oval:def:807
Title: Red Hat XFree86 Buffer Overflow in ReadFontAlias II
Description: Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0084
Version: 2
Platform(s): Red Hat Linux 9
Product(s): XFree86
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:809
 
Oval ID: oval:org.mitre.oval:def:809
Title: XFree86 Font File Handling Vulnerability
Description: Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0106
Version: 2
Platform(s): Red Hat Linux 9
Product(s): XFree86
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:830
 
Oval ID: oval:org.mitre.oval:def:830
Title: XFree86 Buffer Overflow in dirfile
Description: Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0083
Version: 2
Platform(s): Red Hat Enterprise Linux 3
Product(s): XFree86
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:831
 
Oval ID: oval:org.mitre.oval:def:831
Title: XFree86 Buffer Overflow in CopyISOLatin1Lowered Function
Description: Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0084
Version: 2
Platform(s): Red Hat Enterprise Linux 3
Product(s): XFree86
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:832
 
Oval ID: oval:org.mitre.oval:def:832
Title: XFree86 Improper Handling of Font Files
Description: Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0106
Version: 2
Platform(s): Red Hat Enterprise Linux 3
Product(s): XFree86
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9612
 
Oval ID: oval:org.mitre.oval:def:9612
Title: Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
Description: Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0083
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 27
Os 2

OpenVAS Exploits

Date Description
2009-05-05 Name : HP-UX Update for XFree86 HPSBUX01018
File : nvt/gb_hp_ux_HPSBUX01018.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200311-01 (kdebase)
File : nvt/glsa_200311_01.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200402-02 (200402-02)
File : nvt/glsa_200402_02.nasl
2008-09-04 Name : FreeBSD Ports: XFree86-Server
File : nvt/freebsd_XFree86-Server.nasl
2008-09-04 Name : FreeBSD Ports: linux_base
File : nvt/freebsd_linux_base.nasl
2008-01-17 Name : Debian Security Advisory DSA 388-1 (kdebase)
File : nvt/deb_388_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 443-1 (xfree86)
File : nvt/deb_443_1.nasl
0000-00-00 Name : Slackware Advisory SSA:2004-043-02 XFree86 security update
File : nvt/esoft_slk_ssa_2004_043_02.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
8341 XFree86 CopyISOLatin1Lowered Function Overflow

A local overflow exists in XFree86. The CopyISOLatin1Lowered() function fails to validate the length of the font_name buffer when reading the 'font.alias' file. With a specially crafted malformed file, an attacker can execute arbitrary code resulting in a loss of integrity
6883 XFree86 Multiple Unspecified Font File Flaws

XFree86 contains a flaw related to the parsing of the font files that may allow an attacker to execute arbitrary code. No further details have been provided.
6881 XFree86 GLX/DRI Integer Signedness Error Privilege Escalation

6880 XFree86 GLX/DRI Out-of-bounds Array Index Privilege Escalation

4773 KDE KDM pam_setcred() Function Error Condition Privilege Escalation

3905 XFree86 dirfile.c ReadFontAlias Function Overflow

A local overflow exists in XFree86. The 'ReadFontAlias()' function fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted request, a malicious user can cause arbitrary code execution resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2009-04-23 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_3837f4625d6b11d880e30020ed76ef5a.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2004-043-02.nasl - Type : ACT_GATHER_INFO
2005-07-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_bf2e7483d3fa440d8c6e8f1f2f018818.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-388.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-443.nasl - Type : ACT_GATHER_INFO
2004-08-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200402-02.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-091.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-118.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2004-012.nasl - Type : ACT_GATHER_INFO
2004-07-25 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2004_006.nasl - Type : ACT_GATHER_INFO
2004-07-23 Name : The remote Fedora Core host is missing a security update.
File : fedora_2004-069.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2003-270.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2003-289.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-060.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-061.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-152.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:33:06
  • Multiple Updates