Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA443] DSA-443-1 xfree86


Vulnerability Assessment Details

[DSA443] DSA-443-1 xfree86

Vulnerability Assessment Summary
DSA-443-1 xfree86

Detailed Explanation for this Vulnerability Assessment

A number of vulnerabilities have been discovered in XFree86. The corrections
are listed below with the identification from the Common
Vulnerabilities and Exposures (CVE) project:
Buffer overflow in ReadFontAlias from dirfile.c of
XFree86 4.1.0 through 4.3.0 permits local users and remote attackers to
execute arbitrary code via a font alias file (font.alias) with a long
token, a different vulnerability than CVE-2004-0084.
Buffer overflow in the ReadFontAlias function in XFree86
4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, permits
local or remote authenticated users to execute arbitrary code via a
malformed entry in the font alias (font.alias) file, a different
vulnerability than CVE-2004-0083.
Miscellaneous additional flaws in XFree86's handling of
font files.
xdm does not verify whether the pam_setcred function call
succeeds, which may permit attackers to gain root rights by
triggering error conditions within PAM modules, as demonstrated in
certain configurations of the MIT pam_krb5 module.
Denial-of-service attacks against the X
server by clients using the GLX extension and Direct Rendering
Infrastructure are possible due to unchecked client data (out-of-bounds
array indexes [CVE-2004-0093] and integer signedness errors
[CVE-2004-0094]).
Exploitation of CVE-2004-0083, CVE-2004-0084, CVE-2004-0106,
CVE-2004-0093 and CVE-2004-0094 would require a connection to the X
server. By default, display managers in Debian start the X server
with a configuration which only accepts local connections, but if the
configuration is changed to permit remote connections, or X servers are
started by other means, then these bugs could be exploited remotely.
Since the X server usually runs with root rights, these bugs could
potentially be exploited to gain root rights.
No attack vector for CVE-2003-0690 is known at this time.
For the stable distribution (woody) these problems have been fixed in
version 4.1.0-16woody3.
For the unstable distribution (sid) these problems have been fixed in
version 4.3.0-2.
We recommend that you update your xfree86 package.


Solution : http://www.debian.org/security/2004/dsa-443
Network Security Threat Level: High

Networks Security ID: 9636, 9652, 9655, 9701

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

IBM HS22 BLADECENTER SERVER E5630 2.53GHZ 8GB 2 X 1.6TB SSD
$2469.0
IBM HS22 BLADECENTER SERVER E5630 2.53GHZ 8GB 2 X 1.6TB SSD pictureIBM HS22 BLADECENTER SERVER E5620 2.40GHZ 4GB RAM 146GB 15K SAS
$959.0
IBM HS22 BLADECENTER SERVER E5620 2.40GHZ 4GB RAM 146GB 15K SAS pictureIBM System x3850 X5 Server 4x E7-4830 2.13GHz (32 Total Cores) 64GB M1015 Raid
$800.0
IBM System x3850 X5 Server 4x E7-4830 2.13GHz (32 Total Cores) 64GB M1015 Raid pictureIBM SYSTEM X3550 M3 SERVER E5640 2.66GHZ 24GB 3 X 146GB 15K SAS
$789.0
IBM SYSTEM X3550 M3 SERVER E5640 2.66GHZ 24GB 3 X 146GB 15K SAS picture


Discussions

No Discussions have been posted on this vulnerability.