Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4990

Опубликовано: 05 окт. 2007
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1:1.0.5-2
edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

not-affected

1:1.0.5-2
intrepid

not-affected

1:1.0.5-2
jaunty

not-affected

1:1.0.5-2
karmic

not-affected

1:1.0.5-2
upstream

released

1.0.5

Показывать по

Ссылки на источники

EPSS

Процентиль: 88%
0.03789
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

nvd
почти 18 лет назад

The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

debian
почти 18 лет назад

The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 all ...

github
больше 3 лет назад

The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

fstec
почти 18 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 88%
0.03789
Низкий

7.5 High

CVSS2