Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2362

Опубликовано: 16 июн. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 10

Описание

Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.

РелизСтатусПримечание
dapper

released

1:1.0.2-0ubuntu10.13
devel

released

2:1.4.1~git20080131-1ubuntu12
feisty

released

2:1.2.0-3ubuntu8.4
gutsy

released

2:1.3.0.0.dfsg-12ubuntu8.4
hardy

released

2:1.4.1~git20080131-1ubuntu9.2
upstream

released

Показывать по

EPSS

Процентиль: 83%
0.02076
Низкий

10 Critical

CVSS2

Связанные уязвимости

redhat
около 17 лет назад

Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.

nvd
около 17 лет назад

Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.

debian
около 17 лет назад

Multiple integer overflows in the Render extension in the X server 1.4 ...

github
около 3 лет назад

Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.

oracle-oval
около 17 лет назад

ELSA-2008-0504: xorg-x11-server security update (IMPORTANT)

EPSS

Процентиль: 83%
0.02076
Низкий

10 Critical

CVSS2