Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
A number of vulnerabilities have been discovered in XFree86. The corrections
are listed below with the identification from the Common
Vulnerabilities and Exposures (CVE) project:
Buffer overflow in ReadFontAlias from dirfile.c of
XFree86 4.1.0 through 4.3.0 permits local users and remote attackers to
execute arbitrary code via a font alias file (font.alias) with a long
token, a different vulnerability than CVE-2004-0084.
Buffer overflow in the ReadFontAlias function in XFree86
4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, permits
local or remote authenticated users to execute arbitrary code via a
malformed entry in the font alias (font.alias) file, a different
vulnerability than CVE-2004-0083.
Miscellaneous additional flaws in XFree86's handling of
xdm does not verify whether the pam_setcred function call
succeeds, which may permit attackers to gain root rights by
triggering error conditions within PAM modules, as demonstrated in
certain configurations of the MIT pam_krb5 module.
Denial-of-service attacks against the X
server by clients using the GLX extension and Direct Rendering
Infrastructure are possible due to unchecked client data (out-of-bounds
array indexes [CVE-2004-0093] and integer signedness errors
Exploitation of CVE-2004-0083, CVE-2004-0084, CVE-2004-0106,
CVE-2004-0093 and CVE-2004-0094 would require a connection to the X
server. By default, display managers in Debian start the X server
with a configuration which only accepts local connections, but if the
configuration is changed to permit remote connections, or X servers are
started by other means, then these bugs could be exploited remotely.
Since the X server usually runs with root rights, these bugs could
potentially be exploited to gain root rights.
No attack vector for CVE-2003-0690 is known at this time.
For the stable distribution (woody) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you update your xfree86 package.
Solution : http://www.debian.org/security/2004/dsa-443
Network Security Threat Level: High
Networks Security ID: 9636, 9652, 9655, 9701
Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi
|Juniper QFX3500-48S4Q-ACR-H Brand New Open Box SFP+ QSFP Switch with rackmounts
|ALCATEL-LUCENT 3HE04325AA01 IP9IACSEAA SFP-10GE
|Cisco SSM-4GE-INC ASA 4 Port SFP Security Module ASA5510 ASA5520 ASA5540 ASA5550
|Arista Networks SFP-10G-ZR - 10GBASE-ZR SFP+ Optics Module, 80km
No Discussions have been posted on this vulnerability.