---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: X.org X11 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30627 VERIFY ADVISORY: http://secunia.com/advisories/30627/ CRITICAL: Less critical IMPACT: Exposure of sensitive information, Privilege escalation, DoS WHERE: Local system SOFTWARE: X Window System 11 (X11) 6.x http://secunia.com/product/3913/ X Window System 11 (X11) 7.x http://secunia.com/product/8806/ DESCRIPTION: Some vulnerabilities have been reported in X.org X11, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges. 1) An integer overflow error when calculating the size of the glyph exists in the "AllocateGlyph()" function within the Render extension. This can be exploited to cause a heap-based buffer overflow via a specially crafted request. 2) An integer overflow error when calculating the size of the glyph in the "ProcRenderCreateCursor()" function within the Render extension can be exploited to crash the X server via a specially crafted request. 3) An integer overflow error exists in the Render extension when parsing client requests for the "SProcRenderCreateLinearGradient", "SProcRenderCreateRadialGradient", or "SProcRenderCreateConicalGradient" functions and can be exploited to corrupt heap memory. 4) Multiple input validation errors in the "SProcSecurityGenerateAuthorization()", "SProcRecordCreateContext()", and "SProcRecordRegisterClients()" functions within the Record and Security extensions can be exploited to corrupt heap memory via specially crafted requests. Successful exploitation of vulnerabilities #1, #3, and #4 may allow execution of arbitrary code with privileges of the X server (typically root). 5) An integer overflow error when processing parameters to the "ShmPutImage()" request can be exploited to disclose arbitrary memory of the X server process. The vulnerabilities are reported in X.org X11 version R7.3. Other versions may also be affected. SOLUTION: Apply vendor patches. ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff MD5: 7462bea57623ad7ccdcad334ff5592b3 xorg-xserver-1.4-cve-2008-1377.diff SHA1: 2b75985081665b8d646b5810d411047c6c150576 xorg-xserver-1.4-cve-2008-1377.diff ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff MD5: edb93f202b70eea8f6cb6be39b126e56 xorg-xserver-1.4-cve-2008-1379.diff SHA1: 1ca8b8417d805e0c233bda4b980cb168ec444abd xorg-xserver-1.4-cve-2008-1379.diff ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff MD5: 7e45c657e587ddb85b36b0ac155ae20c xorg-xserver-1.4-cve-2008-2360.diff SHA1: 2e8532fe737e702cb18160705cd75daed4141a4c xorg-xserver-1.4-cve-2008-2360.diff ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff MD5: 0841c68a30d458918bd11747cf28bae6 xorg-xserver-1.4-cve-2008-2361.diff SHA1: 950af2461d0bc5ff5b2b3cc40d517344a77e19f9 xorg-xserver-1.4-cve-2008-2361.diff ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff MD5: 7c86b4b6927f1ed6e0f58c04ed984ea5 xorg-xserver-1.4-cve-2008-2362.diff SHA1: e773f720057785062958d0fa9f29a4cb441883c8 xorg-xserver-1.4-cve-2008-2362.diff PROVIDED AND/OR DISCOVERED BY: regenrecht, reported via iDefense. ORIGINAL ADVISORY: X.org: http://lists.freedesktop.org/archives/xorg/2008-June/036026.html iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------