CVE-2005-2495

Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.
References
Link Resource
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
http://marc.info/?l=bugtraq&m=112690609622266&w=2
http://secunia.com/advisories/16777 Vendor Advisory
http://secunia.com/advisories/16790 Vendor Advisory
http://secunia.com/advisories/17044 Vendor Advisory
http://secunia.com/advisories/17215 Vendor Advisory
http://secunia.com/advisories/17258 Vendor Advisory
http://secunia.com/advisories/17278 Vendor Advisory
http://secunia.com/advisories/19624 Vendor Advisory
http://secunia.com/advisories/19796 Vendor Advisory
http://secunia.com/advisories/21318 Vendor Advisory
http://securitytracker.com/id?1014887
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1
http://support.avaya.com/elmodocs2/security/ASA-2005-218.pdf
http://support.avaya.com/elmodocs2/security/ASA-2005-226.pdf
http://www.debian.org/security/2005/dsa-816
http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml
http://www.kb.cert.org/vuls/id/102441 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2005:164
http://www.novell.com/linux/security/advisories/2005_23_sr.html
http://www.novell.com/linux/security/advisories/2005_56_xserver.html
http://www.osvdb.org/19352
http://www.redhat.com/support/errata/RHSA-2005-329.html
http://www.redhat.com/support/errata/RHSA-2005-396.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-501.html Vendor Advisory
http://www.securityfocus.com/advisories/9285
http://www.securityfocus.com/advisories/9286
http://www.securityfocus.com/archive/1/427045/100/0/threaded
http://www.securityfocus.com/archive/1/442163/100/0/threaded
http://www.securityfocus.com/archive/1/442163/100/0/threaded
http://www.securityfocus.com/bid/14807
http://www.vupen.com/english/advisories/2006/3140 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22244
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998
https://www.ubuntu.com/usn/usn-182-1/
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
http://marc.info/?l=bugtraq&m=112690609622266&w=2
http://secunia.com/advisories/16777 Vendor Advisory
http://secunia.com/advisories/16790 Vendor Advisory
http://secunia.com/advisories/17044 Vendor Advisory
http://secunia.com/advisories/17215 Vendor Advisory
http://secunia.com/advisories/17258 Vendor Advisory
http://secunia.com/advisories/17278 Vendor Advisory
http://secunia.com/advisories/19624 Vendor Advisory
http://secunia.com/advisories/19796 Vendor Advisory
http://secunia.com/advisories/21318 Vendor Advisory
http://securitytracker.com/id?1014887
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1
http://support.avaya.com/elmodocs2/security/ASA-2005-218.pdf
http://support.avaya.com/elmodocs2/security/ASA-2005-226.pdf
http://www.debian.org/security/2005/dsa-816
http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml
http://www.kb.cert.org/vuls/id/102441 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2005:164
http://www.novell.com/linux/security/advisories/2005_23_sr.html
http://www.novell.com/linux/security/advisories/2005_56_xserver.html
http://www.osvdb.org/19352
http://www.redhat.com/support/errata/RHSA-2005-329.html
http://www.redhat.com/support/errata/RHSA-2005-396.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-501.html Vendor Advisory
http://www.securityfocus.com/advisories/9285
http://www.securityfocus.com/advisories/9286
http://www.securityfocus.com/archive/1/427045/100/0/threaded
http://www.securityfocus.com/archive/1/442163/100/0/threaded
http://www.securityfocus.com/archive/1/442163/100/0/threaded
http://www.securityfocus.com/bid/14807
http://www.vupen.com/english/advisories/2006/3140 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22244
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998
https://www.ubuntu.com/usn/usn-182-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xfree86_project:xfree86:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:xfree86:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:xfree86:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:xfree86:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:xfree86:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:xfree86:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:xfree86:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:xfree86_project:xfree86:4.2.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt - () ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt -
References () ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U - () ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U -
References () http://marc.info/?l=bugtraq&m=112690609622266&w=2 - () http://marc.info/?l=bugtraq&m=112690609622266&w=2 -
References () http://secunia.com/advisories/16777 - Vendor Advisory () http://secunia.com/advisories/16777 - Vendor Advisory
References () http://secunia.com/advisories/16790 - Vendor Advisory () http://secunia.com/advisories/16790 - Vendor Advisory
References () http://secunia.com/advisories/17044 - Vendor Advisory () http://secunia.com/advisories/17044 - Vendor Advisory
References () http://secunia.com/advisories/17215 - Vendor Advisory () http://secunia.com/advisories/17215 - Vendor Advisory
References () http://secunia.com/advisories/17258 - Vendor Advisory () http://secunia.com/advisories/17258 - Vendor Advisory
References () http://secunia.com/advisories/17278 - Vendor Advisory () http://secunia.com/advisories/17278 - Vendor Advisory
References () http://secunia.com/advisories/19624 - Vendor Advisory () http://secunia.com/advisories/19624 - Vendor Advisory
References () http://secunia.com/advisories/19796 - Vendor Advisory () http://secunia.com/advisories/19796 - Vendor Advisory
References () http://secunia.com/advisories/21318 - Vendor Advisory () http://secunia.com/advisories/21318 - Vendor Advisory
References () http://securitytracker.com/id?1014887 - () http://securitytracker.com/id?1014887 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1 -
References () http://support.avaya.com/elmodocs2/security/ASA-2005-218.pdf - () http://support.avaya.com/elmodocs2/security/ASA-2005-218.pdf -
References () http://support.avaya.com/elmodocs2/security/ASA-2005-226.pdf - () http://support.avaya.com/elmodocs2/security/ASA-2005-226.pdf -
References () http://www.debian.org/security/2005/dsa-816 - () http://www.debian.org/security/2005/dsa-816 -
References () http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml - () http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml -
References () http://www.kb.cert.org/vuls/id/102441 - US Government Resource () http://www.kb.cert.org/vuls/id/102441 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:164 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:164 -
References () http://www.novell.com/linux/security/advisories/2005_23_sr.html - () http://www.novell.com/linux/security/advisories/2005_23_sr.html -
References () http://www.novell.com/linux/security/advisories/2005_56_xserver.html - () http://www.novell.com/linux/security/advisories/2005_56_xserver.html -
References () http://www.osvdb.org/19352 - () http://www.osvdb.org/19352 -
References () http://www.redhat.com/support/errata/RHSA-2005-329.html - () http://www.redhat.com/support/errata/RHSA-2005-329.html -
References () http://www.redhat.com/support/errata/RHSA-2005-396.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-396.html - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-501.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-501.html - Vendor Advisory
References () http://www.securityfocus.com/advisories/9285 - () http://www.securityfocus.com/advisories/9285 -
References () http://www.securityfocus.com/advisories/9286 - () http://www.securityfocus.com/advisories/9286 -
References () http://www.securityfocus.com/archive/1/427045/100/0/threaded - () http://www.securityfocus.com/archive/1/427045/100/0/threaded -
References () http://www.securityfocus.com/archive/1/442163/100/0/threaded - () http://www.securityfocus.com/archive/1/442163/100/0/threaded -
References () http://www.securityfocus.com/bid/14807 - () http://www.securityfocus.com/bid/14807 -
References () http://www.vupen.com/english/advisories/2006/3140 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3140 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22244 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22244 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998 -
References () https://www.ubuntu.com/usn/usn-182-1/ - () https://www.ubuntu.com/usn/usn-182-1/ -

Information

Published : 2005-09-15 20:03

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2495

Mitre link : CVE-2005-2495

CVE.ORG link : CVE-2005-2495


JSON object : View

Products Affected

xfree86_project

  • xfree86
CWE
CWE-189

Numeric Errors