Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1377

Опубликовано: 16 июн. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 9

Описание

The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

РелизСтатусПримечание
dapper

released

1:1.0.2-0ubuntu10.13
devel

released

2:1.4.1~git20080131-1ubuntu12
feisty

released

2:1.2.0-3ubuntu8.4
gutsy

released

2:1.3.0.0.dfsg-12ubuntu8.4
hardy

released

2:1.4.1~git20080131-1ubuntu9.2
upstream

released

Показывать по

EPSS

Процентиль: 84%
0.02373
Низкий

9 Critical

CVSS2

Связанные уязвимости

redhat
около 17 лет назад

The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

nvd
около 17 лет назад

The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

debian
около 17 лет назад

The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients fu ...

github
около 3 лет назад

The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

fstec
около 17 лет назад

Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 84%
0.02373
Низкий

9 Critical

CVSS2