CVE-2007-4990

The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
References
Link Resource
http://bugs.freedesktop.org/show_bug.cgi?id=12299
http://bugs.gentoo.org/show_bug.cgi?id=194606
http://docs.info.apple.com/article.html?artnum=307562
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=602
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html
http://secunia.com/advisories/27040
http://secunia.com/advisories/27052
http://secunia.com/advisories/27060
http://secunia.com/advisories/27176
http://secunia.com/advisories/27228
http://secunia.com/advisories/27240
http://secunia.com/advisories/27560
http://secunia.com/advisories/28004
http://secunia.com/advisories/28514
http://secunia.com/advisories/28536
http://secunia.com/advisories/28542
http://secunia.com/advisories/29420
http://security.gentoo.org/glsa/glsa-200710-11.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103114-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200642-1
http://www.mandriva.com/security/advisories?name=MDKSA-2007:210
http://www.novell.com/linux/security/advisories/2007_54_xorg.html
http://www.redhat.com/support/errata/RHSA-2008-0029.html
http://www.redhat.com/support/errata/RHSA-2008-0030.html
http://www.securityfocus.com/archive/1/481432/100/0/threaded
http://www.securityfocus.com/bid/25898
http://www.securitytracker.com/id?1018763
http://www.vupen.com/english/advisories/2007/3337
http://www.vupen.com/english/advisories/2007/3338
http://www.vupen.com/english/advisories/2007/3467
http://www.vupen.com/english/advisories/2008/0149
http://www.vupen.com/english/advisories/2008/0924/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/36920
https://issues.rpath.com/browse/RPL-1756
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11599
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00352.html
http://bugs.freedesktop.org/show_bug.cgi?id=12299
http://bugs.gentoo.org/show_bug.cgi?id=194606
http://docs.info.apple.com/article.html?artnum=307562
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=602
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html
http://secunia.com/advisories/27040
http://secunia.com/advisories/27052
http://secunia.com/advisories/27060
http://secunia.com/advisories/27176
http://secunia.com/advisories/27228
http://secunia.com/advisories/27240
http://secunia.com/advisories/27560
http://secunia.com/advisories/28004
http://secunia.com/advisories/28514
http://secunia.com/advisories/28536
http://secunia.com/advisories/28542
http://secunia.com/advisories/29420
http://security.gentoo.org/glsa/glsa-200710-11.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103114-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200642-1
http://www.mandriva.com/security/advisories?name=MDKSA-2007:210
http://www.novell.com/linux/security/advisories/2007_54_xorg.html
http://www.redhat.com/support/errata/RHSA-2008-0029.html
http://www.redhat.com/support/errata/RHSA-2008-0030.html
http://www.securityfocus.com/archive/1/481432/100/0/threaded
http://www.securityfocus.com/bid/25898
http://www.securitytracker.com/id?1018763
http://www.vupen.com/english/advisories/2007/3337
http://www.vupen.com/english/advisories/2007/3338
http://www.vupen.com/english/advisories/2007/3467
http://www.vupen.com/english/advisories/2008/0149
http://www.vupen.com/english/advisories/2008/0924/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/36920
https://issues.rpath.com/browse/RPL-1756
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11599
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00352.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:x.org:x_font_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://bugs.freedesktop.org/show_bug.cgi?id=12299 - () http://bugs.freedesktop.org/show_bug.cgi?id=12299 -
References () http://bugs.gentoo.org/show_bug.cgi?id=194606 - () http://bugs.gentoo.org/show_bug.cgi?id=194606 -
References () http://docs.info.apple.com/article.html?artnum=307562 - () http://docs.info.apple.com/article.html?artnum=307562 -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725 -
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=602 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=602 -
References () http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html - () http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html -
References () http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html - () http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html -
References () http://secunia.com/advisories/27040 - () http://secunia.com/advisories/27040 -
References () http://secunia.com/advisories/27052 - () http://secunia.com/advisories/27052 -
References () http://secunia.com/advisories/27060 - () http://secunia.com/advisories/27060 -
References () http://secunia.com/advisories/27176 - () http://secunia.com/advisories/27176 -
References () http://secunia.com/advisories/27228 - () http://secunia.com/advisories/27228 -
References () http://secunia.com/advisories/27240 - () http://secunia.com/advisories/27240 -
References () http://secunia.com/advisories/27560 - () http://secunia.com/advisories/27560 -
References () http://secunia.com/advisories/28004 - () http://secunia.com/advisories/28004 -
References () http://secunia.com/advisories/28514 - () http://secunia.com/advisories/28514 -
References () http://secunia.com/advisories/28536 - () http://secunia.com/advisories/28536 -
References () http://secunia.com/advisories/28542 - () http://secunia.com/advisories/28542 -
References () http://secunia.com/advisories/29420 - () http://secunia.com/advisories/29420 -
References () http://security.gentoo.org/glsa/glsa-200710-11.xml - () http://security.gentoo.org/glsa/glsa-200710-11.xml -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-103114-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-103114-1 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-200642-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-200642-1 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:210 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:210 -
References () http://www.novell.com/linux/security/advisories/2007_54_xorg.html - () http://www.novell.com/linux/security/advisories/2007_54_xorg.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0029.html - () http://www.redhat.com/support/errata/RHSA-2008-0029.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0030.html - () http://www.redhat.com/support/errata/RHSA-2008-0030.html -
References () http://www.securityfocus.com/archive/1/481432/100/0/threaded - () http://www.securityfocus.com/archive/1/481432/100/0/threaded -
References () http://www.securityfocus.com/bid/25898 - () http://www.securityfocus.com/bid/25898 -
References () http://www.securitytracker.com/id?1018763 - () http://www.securitytracker.com/id?1018763 -
References () http://www.vupen.com/english/advisories/2007/3337 - () http://www.vupen.com/english/advisories/2007/3337 -
References () http://www.vupen.com/english/advisories/2007/3338 - () http://www.vupen.com/english/advisories/2007/3338 -
References () http://www.vupen.com/english/advisories/2007/3467 - () http://www.vupen.com/english/advisories/2007/3467 -
References () http://www.vupen.com/english/advisories/2008/0149 - () http://www.vupen.com/english/advisories/2008/0149 -
References () http://www.vupen.com/english/advisories/2008/0924/references - () http://www.vupen.com/english/advisories/2008/0924/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36920 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36920 -
References () https://issues.rpath.com/browse/RPL-1756 - () https://issues.rpath.com/browse/RPL-1756 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11599 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11599 -
References () https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00352.html - () https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00352.html -

Information

Published : 2007-10-05 21:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4990

Mitre link : CVE-2007-4990

CVE.ORG link : CVE-2007-4990


JSON object : View

Products Affected

x.org

  • x_font_server
CWE
CWE-189

Numeric Errors