Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA443] DSA-443-1 xfree86


Vulnerability Assessment Details

[DSA443] DSA-443-1 xfree86

Vulnerability Assessment Summary
DSA-443-1 xfree86

Detailed Explanation for this Vulnerability Assessment

A number of vulnerabilities have been discovered in XFree86. The corrections
are listed below with the identification from the Common
Vulnerabilities and Exposures (CVE) project:
Buffer overflow in ReadFontAlias from dirfile.c of
XFree86 4.1.0 through 4.3.0 permits local users and remote attackers to
execute arbitrary code via a font alias file (font.alias) with a long
token, a different vulnerability than CVE-2004-0084.
Buffer overflow in the ReadFontAlias function in XFree86
4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, permits
local or remote authenticated users to execute arbitrary code via a
malformed entry in the font alias (font.alias) file, a different
vulnerability than CVE-2004-0083.
Miscellaneous additional flaws in XFree86's handling of
font files.
xdm does not verify whether the pam_setcred function call
succeeds, which may permit attackers to gain root rights by
triggering error conditions within PAM modules, as demonstrated in
certain configurations of the MIT pam_krb5 module.
Denial-of-service attacks against the X
server by clients using the GLX extension and Direct Rendering
Infrastructure are possible due to unchecked client data (out-of-bounds
array indexes [CVE-2004-0093] and integer signedness errors
[CVE-2004-0094]).
Exploitation of CVE-2004-0083, CVE-2004-0084, CVE-2004-0106,
CVE-2004-0093 and CVE-2004-0094 would require a connection to the X
server. By default, display managers in Debian start the X server
with a configuration which only accepts local connections, but if the
configuration is changed to permit remote connections, or X servers are
started by other means, then these bugs could be exploited remotely.
Since the X server usually runs with root rights, these bugs could
potentially be exploited to gain root rights.
No attack vector for CVE-2003-0690 is known at this time.
For the stable distribution (woody) these problems have been fixed in
version 4.1.0-16woody3.
For the unstable distribution (sid) these problems have been fixed in
version 4.3.0-2.
We recommend that you update your xfree86 package.


Solution : http://www.debian.org/security/2004/dsa-443
Network Security Threat Level: High

Networks Security ID: 9636, 9652, 9655, 9701

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Juniper SRX3600 Services Gateway *Loaded with cards, check description*
$5500.0
Juniper SRX3600 Services Gateway *Loaded with cards, check description* pictureUTT ER4240G Business Gigabit Router 4 WAN ports, 4 LAN Ports, Load VPN,Firewall
$248.28
UTT ER4240G Business Gigabit Router 4 WAN ports, 4 LAN Ports, Load VPN,Firewall pictureWatchguard Firebox T10 - 3 Ports - 10MB LAN, 100MB LAN, GigE WGT10000-US
$270.44
Watchguard Firebox T10 - 3 Ports - 10MB LAN, 100MB LAN, GigE WGT10000-US pictureCisco ASA 5505 Series Adaptive Security Firewall Appliance
$43.99
Cisco ASA 5505 Series Adaptive Security Firewall Appliance picture


Discussions

No Discussions have been posted on this vulnerability.