CVE-2004-0083

Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821
http://marc.info/?l=bugtraq&m=107644835523678&w=2
http://marc.info/?l=bugtraq&m=107653324115914&w=2
http://marc.info/?l=bugtraq&m=110979666528890&w=2
http://security.gentoo.org/glsa/glsa-200402-02.xml Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57768-1
http://www.debian.org/security/2004/dsa-443
http://www.idefense.com/application/poi/display?id=72
http://www.kb.cert.org/vuls/id/820006 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2004:012
http://www.novell.com/linux/security/advisories/2004_06_xf86.html
http://www.redhat.com/support/errata/RHSA-2004-059.html
http://www.redhat.com/support/errata/RHSA-2004-060.html
http://www.redhat.com/support/errata/RHSA-2004-061.html
http://www.securityfocus.com/bid/9636 Exploit Patch Vendor Advisory
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053
http://www.xfree86.org/cvs/changes Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15130
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A806
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A830
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9612
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821
http://marc.info/?l=bugtraq&m=107644835523678&w=2
http://marc.info/?l=bugtraq&m=107653324115914&w=2
http://marc.info/?l=bugtraq&m=110979666528890&w=2
http://security.gentoo.org/glsa/glsa-200402-02.xml Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57768-1
http://www.debian.org/security/2004/dsa-443
http://www.idefense.com/application/poi/display?id=72
http://www.kb.cert.org/vuls/id/820006 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2004:012
http://www.novell.com/linux/security/advisories/2004_06_xf86.html
http://www.redhat.com/support/errata/RHSA-2004-059.html
http://www.redhat.com/support/errata/RHSA-2004-060.html
http://www.redhat.com/support/errata/RHSA-2004-061.html
http://www.securityfocus.com/bid/9636 Exploit Patch Vendor Advisory
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053
http://www.xfree86.org/cvs/changes Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15130
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A806
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A830
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9612
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xfree86_project:x11r6:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:x11r6:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:x11r6:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:x11r6:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:errata:*:*:*:*:*
cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821 -
References () http://marc.info/?l=bugtraq&m=107644835523678&w=2 - () http://marc.info/?l=bugtraq&m=107644835523678&w=2 -
References () http://marc.info/?l=bugtraq&m=107653324115914&w=2 - () http://marc.info/?l=bugtraq&m=107653324115914&w=2 -
References () http://marc.info/?l=bugtraq&m=110979666528890&w=2 - () http://marc.info/?l=bugtraq&m=110979666528890&w=2 -
References () http://security.gentoo.org/glsa/glsa-200402-02.xml - Vendor Advisory () http://security.gentoo.org/glsa/glsa-200402-02.xml - Vendor Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-57768-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-57768-1 -
References () http://www.debian.org/security/2004/dsa-443 - () http://www.debian.org/security/2004/dsa-443 -
References () http://www.idefense.com/application/poi/display?id=72 - () http://www.idefense.com/application/poi/display?id=72 -
References () http://www.kb.cert.org/vuls/id/820006 - US Government Resource () http://www.kb.cert.org/vuls/id/820006 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:012 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:012 -
References () http://www.novell.com/linux/security/advisories/2004_06_xf86.html - () http://www.novell.com/linux/security/advisories/2004_06_xf86.html -
References () http://www.redhat.com/support/errata/RHSA-2004-059.html - () http://www.redhat.com/support/errata/RHSA-2004-059.html -
References () http://www.redhat.com/support/errata/RHSA-2004-060.html - () http://www.redhat.com/support/errata/RHSA-2004-060.html -
References () http://www.redhat.com/support/errata/RHSA-2004-061.html - () http://www.redhat.com/support/errata/RHSA-2004-061.html -
References () http://www.securityfocus.com/bid/9636 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/9636 - Exploit, Patch, Vendor Advisory
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053 -
References () http://www.xfree86.org/cvs/changes - Vendor Advisory () http://www.xfree86.org/cvs/changes - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15130 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15130 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A806 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A806 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A830 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A830 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9612 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9612 -

Information

Published : 2004-03-03 05:00

Updated : 2024-11-20 23:47


NVD link : CVE-2004-0083

Mitre link : CVE-2004-0083

CVE.ORG link : CVE-2004-0083


JSON object : View

Products Affected

openbsd

  • openbsd

xfree86_project

  • x11r6