|
Family: Debian Local Security Checks --> Category: infos
[DSA1193] DSA-1193-1 xfree86 Vulnerability Scan
Vulnerability Scan Summary DSA-1193-1 xfree86
Detailed Explanation for this Vulnerability Test
Several vulnerabilities have been discovered in the X Window System,
which may lead to the execution of arbitrary code or denial of service.
The Common Vulnerabilities and Exposures project identifies the
following problems:
Chris Evan discovered an integer overflow in the code to handle
PCF fonts, which might lead to denial of service if a malformed
font is opened.
It was discovered that an integer overflow in the code to handle
Adobe Font Metrics might lead to the execution of arbitrary code.
It was discovered that an integer overflow in the code to handle
CMap and CIDFont font data might lead to the execution of arbitrary
code.
The XFree86 initialization code performs insufficient checking of
the return value of setuid() when dropping rights, which might
lead to local privilege escalation.
For the stable distribution (sarge) these problems have been fixed in
version 4.3.0.dfsg.1-14sarge2. This release lacks builds for the
Motorola 680x0 architecture, which failed due to diskspace constraints
on the build host. They will be released once this problem has been
resolved.
For the unstable distribution (sid) these problems have been fixed
in version 1:1.2.2-1 of libxfont and version 1:1.0.2-9 of xorg-server.
We recommend that you upgrade your XFree86 packages.
Solution : http://www.debian.org/security/2006/dsa-1193
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|