---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: X.org X11 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA28532 VERIFY ADVISORY: http://secunia.com/advisories/28532/ CRITICAL: Less critical IMPACT: Exposure of sensitive information, Privilege escalation, DoS WHERE: Local system SOFTWARE: X Window System 11 (X11) 6.x http://secunia.com/product/3913/ X Window System 11 (X11) 7.x http://secunia.com/product/8806/ DESCRIPTION: Some vulnerabilities have been reported in X.org X11, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges. 1) An array indexing error within the XFree86 Misc extension can be exploited to execute arbitrary code by sending a specially crafted PassMessage request. 2) An integer overflow error within the EVI extension can be exploited to cause a heap-based buffer overflow via a specially crafted GetVisualInfo request. 3) An integer overflow error within the MIT-SHM extension can be exploited to overwrite arbitrary memory addresses by creating a pixmap with a specially calculated size. 4) An array indexing error within the "ProcGetReservedColormapEntries()" function from the TOG-CUP extension can be exploited to disclose arbitrary memory. 5) An error in multiple functions contained within the Xinput extension when swapping the byte order of received requests can be exploited to corrupt heap memory. 6) An error exists within the processing of security policy arguments when executing X. This can be exploited to determine the existence of restricted files by passing the file names as arguments to the "X -sp" command. 7) A boundary error exists within the X server when processing PCF fonts. This can be exploited to cause a buffer overflow via a PCF font containing a specially crafted PCF_BDF_ENCODINGS table with the difference between the "last col" and "first col" elements being greater than 255. The vulnerabilities are reported in X.org X11 version R7.3 and prior. SOLUTION: Apply vendor patches. ftp://ftp.freedesktop.org/pub/xorg/X11R7.2/patches/xorg-xserver-1.2-multiple-overflows.diff MD5: 238affb8697e6f095dbb6fe66ceb7873 xorg-xserver-1.2-multiple-overflows.diff SHA1: 6df37147742fcdf429cc980f1a528f1c888efdcb xorg-xserver-1.2-multiple-overflows.diff ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-multiple-overflows.diff MD5: 7aadd3ead8c3bd098413fef91af7d35f xorg-xserver-1.4-multiple-overflows.diff SHA1: b3c9013aa6abc30fabd8f6a85e427f5fd6e6ef6c xorg-xserver-1.4-multiple-overflows.diff ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-libXfont-1.3.1-pcf-parser.diff MD5: f6ea1bae4c5fb279e679fece589eaab6 xorg-libXfont-1.3.1-pcf-parser.diff SHA1: 1d7a07ddb2efa8b56b51c7fad58b7e8e17c6421c xorg-libXfont-1.3.1-pcf-parser.diff PROVIDED AND/OR DISCOVERED BY: 1 - 5) Discovered by regenrecht, reported via iDefense Labs. 6) Takuya Shiozaki 7) Discovered by an anonymous researcher, reported by the vendor. ORIGINAL ADVISORY: iDefense Labs: 1) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=646 2, 3) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=645 4) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=644 5) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=643 X.Org: http://lists.freedesktop.org/archives/xorg/2008-January/031918.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------