Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-198: fonts

Vulnerability Assessment Details

RHSA-2005-198: fonts

Vulnerability Assessment Summary
Check for the version of the fonts packages

Detailed Explanation for this Vulnerability Assessment

Updated xorg-x11 packages that fix a security issue as well as various bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

X.Org X11 is the X Window System which provides the core functionality
of the Linux GUI desktop.

An integer overflow flaw was found in libXpm, which is used by some
applications for loading of XPM images. A possible hacker could create a
carefully crafted XPM file in such a way that it could cause an application
linked with libXpm to execute arbitrary code when the file was opened by a
victim. The Common Vulnerabilities and Exposures project (
has assigned the name CVE-2005-0605 to this issue.

Since the initial release of Red Hat Enterprise Linux 4, a number of issues
have been addressed in the X.Org X11 X Window System. This erratum also
updates X11R6.8 to the latest stable point release (6.8.2), which includes
various stability and reliability fixes including (but not limited to) the

- The 'radeon' driver has been modified to disable "RENDER" acceleration
by default, due to a bug in the implementation which has not yet
been isolated. This can be manually re-enabled by using the
following option in the device section of the X server config file:

Option "RenderAccel"

- The 'vmware' video driver is now available on 64-bit AMD64 and
compatible systems.

- The Intel 'i810' video driver is now available on 64-bit EM64T

- Stability fixes in the X Server's PCI handling layer for 64-bit systems,
which resolve some issues reported by "vesa" and "nv" driver users.

- Support for Hewlett Packard's Itanium ZX2 chipset.

- Nvidia "nv" video driver update provides support for some of
the newer Nvidia chipsets, as well as many stability and reliability

- Intel i810 video driver stability update, which fixes the widely
reported i810/i815 screen refresh issues many have experienced.

- Packaging fixes for multilib systems, which permit both 32-bit
and 64-bit X11 development environments to be simultaneously installed
without file conflicts.

In addition to the above highlights, the X.Org X11 6.8.2 release has a
large number of additional stability fixes which resolve various other
issues reported since the initial release of Red Hat Enterprise Linux 4.

All users of X11 should upgrade to these updated packages, which resolve
these issues.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Lot of 24 - Intel Core i5-4590T i5-4590 i5-4570 Processors SR1QJ SR1S6 SR14E
Lot of 24 - Intel Core i5-4590T i5-4590 i5-4570 Processors SR1QJ SR1S6 SR14E pictureAMD Athlon II Dual-Core Mobile P360 2.3GHz AMP360SGR22GM Processor -Original OEM
AMD Athlon II Dual-Core Mobile P360 2.3GHz AMP360SGR22GM Processor -Original OEM picture


No Discussions have been posted on this vulnerability.