The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
References
Configurations
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321 - | |
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721 - | |
References | () http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html - | |
References | () http://lists.freedesktop.org/archives/xorg/2008-June/036026.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html - Patch | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2008-0502.html - Patch | |
References | () http://rhn.redhat.com/errata/RHSA-2008-0504.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2008-0512.html - | |
References | () http://secunia.com/advisories/30627 - Vendor Advisory | |
References | () http://secunia.com/advisories/30628 - Vendor Advisory | |
References | () http://secunia.com/advisories/30629 - Vendor Advisory | |
References | () http://secunia.com/advisories/30630 - Vendor Advisory | |
References | () http://secunia.com/advisories/30637 - Vendor Advisory | |
References | () http://secunia.com/advisories/30659 - Vendor Advisory | |
References | () http://secunia.com/advisories/30664 - Vendor Advisory | |
References | () http://secunia.com/advisories/30666 - Vendor Advisory | |
References | () http://secunia.com/advisories/30671 - | |
References | () http://secunia.com/advisories/30715 - | |
References | () http://secunia.com/advisories/30772 - | |
References | () http://secunia.com/advisories/30809 - | |
References | () http://secunia.com/advisories/30843 - | |
References | () http://secunia.com/advisories/31025 - | |
References | () http://secunia.com/advisories/31109 - | |
References | () http://secunia.com/advisories/32099 - | |
References | () http://secunia.com/advisories/32545 - | |
References | () http://secunia.com/advisories/33937 - | |
References | () http://security.gentoo.org/glsa/glsa-200806-07.xml - | |
References | () http://securitytracker.com/id?1020247 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1 - | |
References | () http://support.apple.com/kb/HT3438 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm - | |
References | () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 - | |
References | () http://www.debian.org/security/2008/dsa-1595 - Patch | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:115 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:116 - | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0503.html - | |
References | () http://www.securityfocus.com/archive/1/493548/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/493550/100/0/threaded - | |
References | () http://www.ubuntu.com/usn/usn-616-1 - Patch | |
References | () http://www.vupen.com/english/advisories/2008/1803 - | |
References | () http://www.vupen.com/english/advisories/2008/1833 - | |
References | () http://www.vupen.com/english/advisories/2008/1983/references - | |
References | () http://www.vupen.com/english/advisories/2008/3000 - | |
References | () https://issues.rpath.com/browse/RPL-2607 - | |
References | () https://issues.rpath.com/browse/RPL-2619 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109 - |
Information
Published : 2008-06-16 19:41
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1377
Mitre link : CVE-2008-1377
CVE.ORG link : CVE-2008-1377
JSON object : View
Products Affected
x
- x11
CWE
CWE-189
Numeric Errors