Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA443] DSA-443-1 xfree86


Vulnerability Assessment Details

[DSA443] DSA-443-1 xfree86

Vulnerability Assessment Summary
DSA-443-1 xfree86

Detailed Explanation for this Vulnerability Assessment

A number of vulnerabilities have been discovered in XFree86. The corrections
are listed below with the identification from the Common
Vulnerabilities and Exposures (CVE) project:
Buffer overflow in ReadFontAlias from dirfile.c of
XFree86 4.1.0 through 4.3.0 permits local users and remote attackers to
execute arbitrary code via a font alias file (font.alias) with a long
token, a different vulnerability than CVE-2004-0084.
Buffer overflow in the ReadFontAlias function in XFree86
4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, permits
local or remote authenticated users to execute arbitrary code via a
malformed entry in the font alias (font.alias) file, a different
vulnerability than CVE-2004-0083.
Miscellaneous additional flaws in XFree86's handling of
font files.
xdm does not verify whether the pam_setcred function call
succeeds, which may permit attackers to gain root rights by
triggering error conditions within PAM modules, as demonstrated in
certain configurations of the MIT pam_krb5 module.
Denial-of-service attacks against the X
server by clients using the GLX extension and Direct Rendering
Infrastructure are possible due to unchecked client data (out-of-bounds
array indexes [CVE-2004-0093] and integer signedness errors
[CVE-2004-0094]).
Exploitation of CVE-2004-0083, CVE-2004-0084, CVE-2004-0106,
CVE-2004-0093 and CVE-2004-0094 would require a connection to the X
server. By default, display managers in Debian start the X server
with a configuration which only accepts local connections, but if the
configuration is changed to permit remote connections, or X servers are
started by other means, then these bugs could be exploited remotely.
Since the X server usually runs with root rights, these bugs could
potentially be exploited to gain root rights.
No attack vector for CVE-2003-0690 is known at this time.
For the stable distribution (woody) these problems have been fixed in
version 4.1.0-16woody3.
For the unstable distribution (sid) these problems have been fixed in
version 4.3.0-2.
We recommend that you update your xfree86 package.


Solution : http://www.debian.org/security/2004/dsa-443
Network Security Threat Level: High

Networks Security ID: 9636, 9652, 9655, 9701

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Dell PowerEdge R710 Server Dual Xeon X5670 6C 2.93GHz 128GB 4x 1TB 2.5in RPS
$1092.0
Dell PowerEdge R710 Server Dual Xeon X5670 6C 2.93GHz 128GB 4x 1TB 2.5in RPS pictureDell PowerEdge R710 Server Dual Xeon E5506 QC 2.13GHz 192GB 2.5in RPS
$660.0
Dell PowerEdge R710 Server Dual Xeon E5506 QC 2.13GHz 192GB 2.5in RPS pictureHP ProLiant DL380p G8 Server Dual Xeon E5-2660 v2 10C 2.2GHz 192GB 2x 146GB, 6x
$3253.0
HP ProLiant DL380p G8 Server Dual Xeon E5-2660 v2 10C 2.2GHz 192GB 2x 146GB, 6x  pictureDell PowerEdge R710 Server Dual X5650 6C 2.66GHz 72GB 4x 146GB 15K SAS 2.5in
$538.0
Dell PowerEdge R710 Server Dual X5650 6C 2.66GHz 72GB 4x 146GB 15K SAS 2.5in picture


Discussions

No Discussions have been posted on this vulnerability.