Описание
Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
Отчет
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. This flaw only affects X clients that connect to malicious X servers. Generally speaking, these will be untrusted/unknown X servers only, as trusted remote X servers should be connected to via SSH (which provides end-point verification and authentication), or the local X server. Because this flaw requires that the X server be changed (recompiled to deviate from a standard X server) in order to impact the X client, it requires root privileges on the X server to effect the change. If this is a system where the X client and server are on the same (local) host, and an attacker is able to replace the X server binary, then they already have root privileges and no trust boundary is crossed. With remote X servers, using SSH with strict host-key checking will prevent the X client from connecting to the X server without intervention, as the user will be alerted to host-key changes.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | libdmx | Will not fix | ||
| Red Hat Enterprise Linux 6 | libdmx | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libX11 | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libxcb | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libXcursor | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libXext | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libXfixes | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libXi | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libXinerama | Fixed | RHSA-2014:1436 | 13.10.2014 |
| Red Hat Enterprise Linux 6 | libXp | Fixed | RHSA-2014:1436 | 13.10.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X s ...
Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
4.3 Medium
CVSS2