Описание
Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 1:1.0.4-2ubuntu1 |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | released | 1:1.0.4-2ubuntu1 |
hardy | released | 1:1.0.4-2ubuntu1 |
intrepid | released | 1:1.0.4-2ubuntu1 |
jaunty | released | 1:1.0.4-2ubuntu1 |
karmic | released | 1:1.0.4-2ubuntu1 |
upstream | needed |
Показывать по
Ссылки на источники
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
Integer overflow in the build_range function in X.Org X Font Server (x ...
Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.8 Medium
CVSS2