Search criteria

16 vulnerabilities found for x11 by x

VAR-201205-0381

Vulnerability from variot - Updated: 2023-12-18 13:49

Format string vulnerability in the LogVHdrMessageVerb function in os/log.c in X.Org X11 1.11 allows attackers to cause a denial of service or possibly execute arbitrary code via format string specifiers in an input device name. X.Org is an open source implementation of the X.Org Foundation for the X Window System. X.Org is prone to a local format-string vulnerability. An attacker may exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201207-04


                                        http://security.gentoo.org/

Severity: High Title: X.Org X Server: Privilege escalation Date: July 09, 2012 Bugs: #412609 ID: 201207-04


Synopsis

A format string vulnerability in X.Org X Server may allow local privilege escalation or Denial of Service.

NOTE: Exposure to this vulnerability is reduced in Gentoo due to X.Org X Server being built with "-D_FORTIFY_SOURCE=2" by default.

Impact

A local attacker could gain escalated privileges or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All X.Org X Server 1.11.x users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.11.4-r1"=

All X.Org X Server 1.10.x users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.10.6-r1"=

X.Org X Server 1.9.x is not affected.

References

[ 1 ] CVE-2012-2118 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2118

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201207-04.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-1502-1 July 11, 2012

xorg-server vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS

Summary:

The X.Org X server could be made to crash if a specially crafted input device was added.

The default compiler options for the affected release should reduce the vulnerability to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 LTS: xserver-xorg-core 2:1.11.4-0ubuntu10.5

After a standard system update you need to reboot your computer to make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-1502-1 CVE-2012-2118

Package Information: https://launchpad.net/ubuntu/+source/xorg-server/2:1.11.4-0ubuntu10.5 .


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2118 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0299


Updated Packages:

Mandriva Business Server 1/X86_64: 00a312b53f5f738eb99136baa320b377 mbs1/x86_64/x11-server-1.11.4-12.1.mbs1.x86_64.rpm 5d7904e06c3ac9f9a2ec7ffc17e08e84 mbs1/x86_64/x11-server-common-1.11.4-12.1.mbs1.x86_64.rpm 0afd9ce4b40f61de739c6e044b18214d mbs1/x86_64/x11-server-devel-1.11.4-12.1.mbs1.x86_64.rpm cd0740f1c1b38629c715d4928b5b073c mbs1/x86_64/x11-server-source-1.11.4-12.1.mbs1.noarch.rpm f67e5502f5a3f539b63f3035b6d2bfeb mbs1/x86_64/x11-server-xdmx-1.11.4-12.1.mbs1.x86_64.rpm 0ade415fecb6b7025db51ca751713284 mbs1/x86_64/x11-server-xephyr-1.11.4-12.1.mbs1.x86_64.rpm e876de003069ff43554b5df2bb44a92c mbs1/x86_64/x11-server-xfake-1.11.4-12.1.mbs1.x86_64.rpm a063fca83d52a911533a0e65507593c5 mbs1/x86_64/x11-server-xfbdev-1.11.4-12.1.mbs1.x86_64.rpm d77deac2203fab6cd1dcff00bee9c706 mbs1/x86_64/x11-server-xnest-1.11.4-12.1.mbs1.x86_64.rpm 0d404052d4611a66228afadf3ce406c9 mbs1/x86_64/x11-server-xorg-1.11.4-12.1.mbs1.x86_64.rpm 28d31da41ae4293f0565a25c385058bd mbs1/x86_64/x11-server-xvfb-1.11.4-12.1.mbs1.x86_64.rpm f2c9457f6009e3d0f1b6cf29b575128f mbs1/SRPMS/x11-server-1.11.4-12.1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRZWOCmqjQ0CJFipgRAsWxAJwLgz1JpCiGvTEgKYKW/AC8wTjpsQCg6hrX 4uir2ZgG/O3KO+jNnlFYOpc= =4lwv -----END PGP SIGNATURE-----

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0381",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "x11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "x",
        "version": "1.11"
      },
      {
        "model": "x.org",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "x",
        "version": "0"
      },
      {
        "model": "x.org x11",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "x",
        "version": "1.11"
      },
      {
        "model": "linux lts i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "linux lts amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "db": "BID",
        "id": "53150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:x.org:x11:1.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kees Cook",
    "sources": [
      {
        "db": "BID",
        "id": "53150"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-2118",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2012-2118",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2012-7656",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-2118",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2012-7656",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201204-425",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2012-2118",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Format string vulnerability in the LogVHdrMessageVerb function in os/log.c in X.Org X11 1.11 allows attackers to cause a denial of service or possibly execute arbitrary code via format string specifiers in an input device name. X.Org is an open source implementation of the X.Org Foundation for the X Window System. X.Org is prone to a local format-string vulnerability. \nAn attacker may exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201207-04\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: X.Org X Server: Privilege escalation\n     Date: July 09, 2012\n     Bugs: #412609\n       ID: 201207-04\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA format string vulnerability in X.Org X Server may allow local\nprivilege escalation or Denial of Service. \n\nNOTE: Exposure to this vulnerability is reduced in Gentoo due to X.Org\nX Server being built with \"-D_FORTIFY_SOURCE=2\" by default. \n\nImpact\n======\n\nA local attacker could gain escalated privileges or cause a Denial of\nService condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll X.Org X Server 1.11.x users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=x11-base/xorg-server-1.11.4-r1\"=\n\n\nAll X.Org X Server 1.10.x users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=x11-base/xorg-server-1.10.6-r1\"=\n\n\nX.Org X Server 1.9.x is not affected. \n\nReferences\n==========\n\n[ 1 ] CVE-2012-2118\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2118\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201207-04.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ==========================================================================\nUbuntu Security Notice USN-1502-1\nJuly 11, 2012\n\nxorg-server vulnerability\n==========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n\nSummary:\n\nThe X.Org X server could be made to crash if a specially crafted input\ndevice was added. \n\nThe default compiler options for the affected release should reduce\nthe vulnerability to a denial of service. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n  xserver-xorg-core               2:1.11.4-0ubuntu10.5\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nReferences:\n  http://www.ubuntu.com/usn/usn-1502-1\n  CVE-2012-2118\n\nPackage Information:\n  https://launchpad.net/ubuntu/+source/xorg-server/2:1.11.4-0ubuntu10.5\n. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2118\n https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0299\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 00a312b53f5f738eb99136baa320b377  mbs1/x86_64/x11-server-1.11.4-12.1.mbs1.x86_64.rpm\n 5d7904e06c3ac9f9a2ec7ffc17e08e84  mbs1/x86_64/x11-server-common-1.11.4-12.1.mbs1.x86_64.rpm\n 0afd9ce4b40f61de739c6e044b18214d  mbs1/x86_64/x11-server-devel-1.11.4-12.1.mbs1.x86_64.rpm\n cd0740f1c1b38629c715d4928b5b073c  mbs1/x86_64/x11-server-source-1.11.4-12.1.mbs1.noarch.rpm\n f67e5502f5a3f539b63f3035b6d2bfeb  mbs1/x86_64/x11-server-xdmx-1.11.4-12.1.mbs1.x86_64.rpm\n 0ade415fecb6b7025db51ca751713284  mbs1/x86_64/x11-server-xephyr-1.11.4-12.1.mbs1.x86_64.rpm\n e876de003069ff43554b5df2bb44a92c  mbs1/x86_64/x11-server-xfake-1.11.4-12.1.mbs1.x86_64.rpm\n a063fca83d52a911533a0e65507593c5  mbs1/x86_64/x11-server-xfbdev-1.11.4-12.1.mbs1.x86_64.rpm\n d77deac2203fab6cd1dcff00bee9c706  mbs1/x86_64/x11-server-xnest-1.11.4-12.1.mbs1.x86_64.rpm\n 0d404052d4611a66228afadf3ce406c9  mbs1/x86_64/x11-server-xorg-1.11.4-12.1.mbs1.x86_64.rpm\n 28d31da41ae4293f0565a25c385058bd  mbs1/x86_64/x11-server-xvfb-1.11.4-12.1.mbs1.x86_64.rpm \n f2c9457f6009e3d0f1b6cf29b575128f  mbs1/SRPMS/x11-server-1.11.4-12.1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFRZWOCmqjQ0CJFipgRAsWxAJwLgz1JpCiGvTEgKYKW/AC8wTjpsQCg6hrX\n4uir2ZgG/O3KO+jNnlFYOpc=\n=4lwv\n-----END PGP SIGNATURE-----\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "db": "BID",
        "id": "53150"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "db": "PACKETSTORM",
        "id": "114582"
      },
      {
        "db": "PACKETSTORM",
        "id": "114631"
      },
      {
        "db": "PACKETSTORM",
        "id": "121272"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-2118",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "53150",
        "trust": 2.6
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2012/04/19/2",
        "trust": 1.7
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2012/04/18/8",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "19404",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "74930",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[OSS-SECURITY] 20120418 RE: CVE REQUEST: XORG INPUT DEVICE FORMAT STRING FLAW",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[OSS-SECURITY] 20120418 CVE REQUEST: XORG INPUT DEVICE FORMAT STRING FLAW",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2118",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "114582",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "114631",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "121272",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "db": "BID",
        "id": "53150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "db": "PACKETSTORM",
        "id": "114582"
      },
      {
        "db": "PACKETSTORM",
        "id": "114631"
      },
      {
        "db": "PACKETSTORM",
        "id": "121272"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ]
  },
  "id": "VAR-201205-0381",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:49:10.103000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "patch/10001",
        "trust": 0.8,
        "url": "http://patchwork.freedesktop.org/patch/10001/"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.x.org/wiki/"
      },
      {
        "title": "Debian CVElist Bug Report Logs: CVE-2012-2118",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a4adb9729a486c893dd67000cd0d4860"
      },
      {
        "title": "Ubuntu Security Notice: xorg-server vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1502-1"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/53150"
      },
      {
        "trust": 1.7,
        "url": "http://www.openwall.com/lists/oss-security/2012/04/19/2"
      },
      {
        "trust": 1.7,
        "url": "http://patchwork.freedesktop.org/patch/10001/"
      },
      {
        "trust": 1.7,
        "url": "http://www.openwall.com/lists/oss-security/2012/04/18/8"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74930"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2118"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2118"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/53150/info"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/74930"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/19404"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/oss-sec/2012/q2/110"
      },
      {
        "trust": 0.3,
        "url": "http://www.x.org/wiki/"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2118"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673148"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/1502-1/"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2118"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-201207-04.xml"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/xorg-server/2:1.11.4-0ubuntu10.5"
      },
      {
        "trust": 0.1,
        "url": "http://www.ubuntu.com/usn/usn-1502-1"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0299"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "db": "BID",
        "id": "53150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "db": "PACKETSTORM",
        "id": "114582"
      },
      {
        "db": "PACKETSTORM",
        "id": "114631"
      },
      {
        "db": "PACKETSTORM",
        "id": "121272"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "db": "BID",
        "id": "53150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "db": "PACKETSTORM",
        "id": "114582"
      },
      {
        "db": "PACKETSTORM",
        "id": "114631"
      },
      {
        "db": "PACKETSTORM",
        "id": "121272"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "date": "2012-05-18T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "date": "2012-04-18T00:00:00",
        "db": "BID",
        "id": "53150"
      },
      {
        "date": "2012-05-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "date": "2012-07-10T13:48:11",
        "db": "PACKETSTORM",
        "id": "114582"
      },
      {
        "date": "2012-07-12T01:27:45",
        "db": "PACKETSTORM",
        "id": "114631"
      },
      {
        "date": "2013-04-11T15:51:14",
        "db": "PACKETSTORM",
        "id": "121272"
      },
      {
        "date": "2012-05-18T22:55:03.093000",
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "date": "2012-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-2118"
      },
      {
        "date": "2013-04-10T17:58:00",
        "db": "BID",
        "id": "53150"
      },
      {
        "date": "2012-05-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002467"
      },
      {
        "date": "2017-08-29T01:31:30.930000",
        "db": "NVD",
        "id": "CVE-2012-2118"
      },
      {
        "date": "2012-05-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "X.Org Input Device Format String Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7656"
      },
      {
        "db": "BID",
        "id": "53150"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201204-425"
      }
    ],
    "trust": 0.6
  }
}

FKIE_CVE-2011-0465

Vulnerability from fkie_nvd - Published: 2011-04-08 15:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
References
cve@mitre.orghttp://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56Patch
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html
cve@mitre.orghttp://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.htmlPatch
cve@mitre.orghttp://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.htmlPatch
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html
cve@mitre.orghttp://secunia.com/advisories/44010
cve@mitre.orghttp://secunia.com/advisories/44012
cve@mitre.orghttp://secunia.com/advisories/44040Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/44082
cve@mitre.orghttp://secunia.com/advisories/44122
cve@mitre.orghttp://secunia.com/advisories/44123
cve@mitre.orghttp://secunia.com/advisories/44193
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.465748
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2213
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:076
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0432.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0433.html
cve@mitre.orghttp://www.securityfocus.com/bid/47189
cve@mitre.orghttp://www.securitytracker.com/id?1025317
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1107-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0880Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0889
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0906
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0929
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0966
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0975
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=680196Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/66585
cve@mitre.orghttps://lwn.net/Articles/437150/
af854a3a-2127-422b-91ae-364da2661108http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44010
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44012
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44040Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44082
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44122
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44123
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44193
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.465748
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2213
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:076
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0432.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0433.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47189
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025317
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1107-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0880Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0889
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0906
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0929
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0966
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0975
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=680196Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/66585
af854a3a-2127-422b-91ae-364da2661108https://lwn.net/Articles/437150/
Impacted products
Vendor Product Version
matthias_hopf xrdb *
matthias_hopf xrdb 1.0.2
matthias_hopf xrdb 1.0.3
matthias_hopf xrdb 1.0.4
matthias_hopf xrdb 1.0.5
matthias_hopf xrdb 1.0.6
matthias_hopf xrdb 1.0.7
x x11 *
x x11 r1
x x11 r2
x x11 r3
x x11 r4
x x11 r5
x x11 r6
x x11 r6.1
x x11 r6.3
x x11 r6.4
x x11 r6.5.1
x x11 r6.6
x x11 r6.7
x x11 r6.7.0
x x11 r6.8.0
x x11 r6.8.1
x x11 r6.8.2
x x11 r6.9.0
x x11 r7.0
x x11 r7.1
x x11 r7.2
x x11 r7.3
x x11 r7.4
x x11 r7.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:matthias_hopf:xrdb:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD59270-E5E0-4379-9575-AE5AB2148E1D",
              "versionEndIncluding": "1.0.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:matthias_hopf:xrdb:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B8F1754-D251-4A6E-8AFC-3550F2102248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:matthias_hopf:xrdb:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB19EBA-1507-4402-8225-9478ACAD8C9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:matthias_hopf:xrdb:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "48BB77C1-8510-40DB-895A-FFED72306273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:matthias_hopf:xrdb:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "49FF1D6D-66B7-48FF-AAB7-795FFE1FA9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:matthias_hopf:xrdb:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E220C3DA-EA45-4036-BB90-02F4D8CDE627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:matthias_hopf:xrdb:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2A35AB-9AE5-41F0-BBDA-BF2A79BE6EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4F9A96-C59C-4136-A0BE-D3217F3BA499",
              "versionEndIncluding": "r7.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4312D425-42E5-464F-A604-1CCBE814FBDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC3433B-1003-4A40-985E-A5CDD89E4075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B990CE-C9D5-4D18-9BEF-993307973CDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F275B689-B2D8-4FDF-9907-3A96A2499BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r5:*:*:*:*:*:*:*",
              "matchCriteriaId": "409466AF-4B0C-4BE3-9A43-548BB2270757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90CD9134-4432-4811-BEF6-6C534866B30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2FE5DBF-B97C-4D4C-9D67-3132904FFE23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "515010F3-3748-440D-9E2C-22EDF80F98A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AD143D0-0644-4E9D-8D8B-9994DBD6C88A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "95394783-5CCD-4804-9AA7-97E7A47D5804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AD03E9-3F5B-4D83-BD62-0AC44A8E6F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDDACACE-07CB-41B8-BF88-E488A1343C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "23AADC6A-1365-4527-9C56-BB3B8841F0EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF827DA2-3209-4816-91DD-223B850A6963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A97C0B-1517-4685-90C0-48F4435A5CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A43995-9F68-4CEA-AB2F-D4CB0A3A92DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r6.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4098EE5E-B518-4AA1-960C-84779D046D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1325CA23-0F2F-4719-B2DF-34DCE9377EB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "973A6F45-2989-44E3-8268-B663FBEEAC67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72086D97-9941-4FCB-B28B-8F19F524C756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F156D71-455F-4B66-9E0C-E8A085B8206A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C84419E-79AA-49C6-ACD2-A94E5E932377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:x:x11:r7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13953D2-F78D-4FF1-8815-EFEC878C4EA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message."
    },
    {
      "lang": "es",
      "value": "xrdb.c en xrdb anterior a v1.0.9 en X.Org X11R7.6 y anteriores permite a atacantes remotos ejecutar comandos arbitrarios mediante metacaracteres en un hostname obtenido de un mensaje (1) DHCP o (2) XDMCP."
    }
  ],
  "id": "CVE-2011-0465",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-08T15:17:25.697",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44010"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44040"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44082"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44122"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44123"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44193"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2213"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/47189"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025317"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1107-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0880"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0889"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0906"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0929"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0966"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0975"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lwn.net/Articles/437150/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/47189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1107-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0889"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lwn.net/Articles/437150/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-2360

Vulnerability from fkie_nvd - Published: 2008-06-16 19:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
References
secalert@redhat.comftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diffPatch
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
secalert@redhat.comhttp://lists.freedesktop.org/archives/xorg/2008-June/036026.htmlPatch
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.htmlPatch
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0502.htmlPatch
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0504.htmlPatch
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0512.htmlPatch
secalert@redhat.comhttp://secunia.com/advisories/30627Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30628Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30629Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30630Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30637Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30659Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30664Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30666Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30671
secalert@redhat.comhttp://secunia.com/advisories/30715
secalert@redhat.comhttp://secunia.com/advisories/30772
secalert@redhat.comhttp://secunia.com/advisories/30809
secalert@redhat.comhttp://secunia.com/advisories/30843
secalert@redhat.comhttp://secunia.com/advisories/31025
secalert@redhat.comhttp://secunia.com/advisories/31109
secalert@redhat.comhttp://secunia.com/advisories/32099
secalert@redhat.comhttp://secunia.com/advisories/33937
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200806-07.xml
secalert@redhat.comhttp://securitytracker.com/id?1020243
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
secalert@redhat.comhttp://support.apple.com/kb/HT3438
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1595Patch
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:115
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:116
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:179
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0503.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493548/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493550/100/0/threaded
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-616-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1803
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1833
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1983/references
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2607
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2619
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diffPatch
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg/2008-June/036026.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0502.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0504.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0512.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30627Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30628Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30629Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30630Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30637Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30659Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30664Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30666Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30671
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30715
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30809
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30843
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31025
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31109
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32099
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33937
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200806-07.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1020243
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3438
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1595Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0503.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493548/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493550/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-616-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1803
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1833
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1983/references
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2607
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2619
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329
Impacted products
Vendor Product Version
x x11 r7.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F156D71-455F-4B66-9E0C-E8A085B8206A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "Desboramiento de entero en la funci\u00f3n AllocateGlyph de la extensi\u00f3n Render del servidor X-window 1.4 en X.org X11R7.3 permite a atacantes, dependiendo del contexto, ejecutar c\u00f3digo arbitrario a trav\u00e9s de campos de solicitud no especificados, que son usados para calcular el tama\u00f1o del mont\u00edculo del buffer, que dispara un desbordamiento de buffer basado en mont\u00edculo."
    }
  ],
  "id": "CVE-2008-2360",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-16T19:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30628"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30629"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1020243"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1020243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1379

Vulnerability from fkie_nvd - Published: 2008-06-16 19:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
References
secalert@redhat.comftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diffPatch
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
secalert@redhat.comhttp://lists.freedesktop.org/archives/xorg/2008-June/036026.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0502.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0504.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0512.html
secalert@redhat.comhttp://secunia.com/advisories/30627Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30628Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30629Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30630Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30637Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30659Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30664Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30666Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30671
secalert@redhat.comhttp://secunia.com/advisories/30715
secalert@redhat.comhttp://secunia.com/advisories/30772
secalert@redhat.comhttp://secunia.com/advisories/30809
secalert@redhat.comhttp://secunia.com/advisories/30843
secalert@redhat.comhttp://secunia.com/advisories/31025
secalert@redhat.comhttp://secunia.com/advisories/31109
secalert@redhat.comhttp://secunia.com/advisories/32099
secalert@redhat.comhttp://secunia.com/advisories/32545
secalert@redhat.comhttp://secunia.com/advisories/33937
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200806-07.xml
secalert@redhat.comhttp://securitytracker.com/id?1020246
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
secalert@redhat.comhttp://support.apple.com/kb/HT3438
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1595
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:115
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:116
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:179
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0503.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493548/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493550/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/29669Patch
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-616-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1803
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1833
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1983/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/3000
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/43016
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2607
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2619
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diffPatch
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0502.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0504.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0512.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30627Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30628Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30629Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30630Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30637Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30659Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30664Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30666Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30671
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30715
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30809
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30843
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31025
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31109
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32099
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32545
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33937
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200806-07.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1020246
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3438
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1595
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0503.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493548/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493550/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29669Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-616-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1803
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1833
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1983/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3000
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43016
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2607
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2619
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966
Impacted products
Vendor Product Version
x x11 r7.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F156D71-455F-4B66-9E0C-E8A085B8206A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n fbShmPutImage de la extensi\u00f3n MIT-SHM en el X server 1.4 de X.Org X11R7.3, permite a atacantes dependientes del contexto leer la memoria de procesos de su elecci\u00f3n mediante valores manipulados para el alto y ancho de un Pixmap."
    }
  ],
  "id": "CVE-2008-1379",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-16T19:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30628"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30629"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32545"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1020246"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29669"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/3000"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1020246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29669"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1377

Vulnerability from fkie_nvd - Published: 2008-06-16 19:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
References
secalert@redhat.comftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
secalert@redhat.comhttp://lists.freedesktop.org/archives/xorg/2008-June/036026.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.htmlPatch
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0502.htmlPatch
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0504.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0512.html
secalert@redhat.comhttp://secunia.com/advisories/30627Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30628Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30629Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30630Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30637Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30659Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30664Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30666Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30671
secalert@redhat.comhttp://secunia.com/advisories/30715
secalert@redhat.comhttp://secunia.com/advisories/30772
secalert@redhat.comhttp://secunia.com/advisories/30809
secalert@redhat.comhttp://secunia.com/advisories/30843
secalert@redhat.comhttp://secunia.com/advisories/31025
secalert@redhat.comhttp://secunia.com/advisories/31109
secalert@redhat.comhttp://secunia.com/advisories/32099
secalert@redhat.comhttp://secunia.com/advisories/32545
secalert@redhat.comhttp://secunia.com/advisories/33937
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200806-07.xml
secalert@redhat.comhttp://securitytracker.com/id?1020247
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
secalert@redhat.comhttp://support.apple.com/kb/HT3438
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1595Patch
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:115
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:116
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0503.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493548/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493550/100/0/threaded
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-616-1Patch
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1803
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1833
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1983/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/3000
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2607
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2619
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0502.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0504.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0512.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30627Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30628Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30629Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30630Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30637Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30659Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30664Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30666Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30671
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30715
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30809
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30843
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31025
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31109
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32099
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32545
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33937
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200806-07.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1020247
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3438
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1595Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0503.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493548/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493550/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-616-1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1803
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1833
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1983/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3000
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2607
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2619
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109
Impacted products
Vendor Product Version
x x11 r7.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F156D71-455F-4B66-9E0C-E8A085B8206A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption."
    },
    {
      "lang": "es",
      "value": "Las funciones (1) SProcRecordCreateContext y (2) SProcRecordRegisterClients en la extensi\u00f3n Record y la funci\u00f3n (3) SProcSecurityGenerateAuthorization en la extensi\u00f3n Security del servidor X 1.4 en X.Org X11R7.3 permite a atacantes dependientes de contexto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de peticiones con longitud de valores manipuladas que especifica un n\u00famero aleatorio de bytes a ser intercambiados en el mont\u00edculo, lo cual dispara corrupci\u00f3n de mont\u00edculo."
    }
  ],
  "id": "CVE-2008-1377",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-16T19:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30628"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30629"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32545"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1020247"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/3000"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1020247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-2362

Vulnerability from fkie_nvd - Published: 2008-06-16 19:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
References
secalert@redhat.comftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diffPatch
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
secalert@redhat.comhttp://lists.freedesktop.org/archives/xorg/2008-June/036026.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2008-0504.html
secalert@redhat.comhttp://secunia.com/advisories/30627Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30630Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30637Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30659Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30664Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30666Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/30671
secalert@redhat.comhttp://secunia.com/advisories/30715
secalert@redhat.comhttp://secunia.com/advisories/30772
secalert@redhat.comhttp://secunia.com/advisories/30809
secalert@redhat.comhttp://secunia.com/advisories/30843
secalert@redhat.comhttp://secunia.com/advisories/31025
secalert@redhat.comhttp://secunia.com/advisories/31109
secalert@redhat.comhttp://secunia.com/advisories/32099
secalert@redhat.comhttp://secunia.com/advisories/33937
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200806-07.xml
secalert@redhat.comhttp://securitytracker.com/id?1020245
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
secalert@redhat.comhttp://support.apple.com/kb/HT3438
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1595
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:116
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:179
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493548/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/493550/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/29670Patch
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-616-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1803
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1833
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1983/references
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2607
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-2619
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diffPatch
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0504.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30627Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30630Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30637Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30659Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30664Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30666Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30671
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30715
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30809
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30843
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31025
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31109
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32099
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33937
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200806-07.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1020245
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3438
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1595
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493548/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493550/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29670Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-616-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1803
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1833
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1983/references
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2607
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2619
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246
Impacted products
Vendor Product Version
x x11 r7.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F156D71-455F-4B66-9E0C-E8A085B8206A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de entero en la extensi\u00f3n Render en el servidor X 1.4 de X.Org X11R7.3 permite a atacantes dependientes de contexto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, o (3) SProcRenderCreateConicalGradient con un campo inv\u00e1lido especificando el n\u00famero de bytes a intercambiar en la petici\u00f3n de datos, lo cual dispara una corrupci\u00f3n de memoria en mont\u00edculo."
    }
  ],
  "id": "CVE-2008-2362",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-16T19:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1020245"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29670"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30666"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1020245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29670"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-616-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1983/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-0465 (GCVE-0-2011-0465)

Vulnerability from cvelistv5 – Published: 2011-04-08 15:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.freedesktop.org/archives/xorg-announ… mailing-listx_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2011-04… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0966 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44040 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2213 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/44082 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=680196 x_refsource_CONFIRM
http://www.securitytracker.com/id?1025317 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/47189 vdb-entryx_refsource_BID
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/44123 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0880 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0906 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44012 third-party-advisoryx_refsource_SECUNIA
http://cgit.freedesktop.org/xorg/app/xrdb/commit/… x_refsource_CONFIRM
http://secunia.com/advisories/44010 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.ubuntu.com/usn/USN-1107-1 vendor-advisoryx_refsource_UBUNTU
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.vupen.com/english/advisories/2011/0889 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0929 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44122 third-party-advisoryx_refsource_SECUNIA
http://lists.freedesktop.org/archives/xorg-announ… mailing-listx_refsource_MLIST
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-04… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0975 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44193 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://lwn.net/Articles/437150/ vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.842Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[xorg-announce] 20110405 X.Org security advisory: root hole via rogue hostname",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
          },
          {
            "name": "RHSA-2011:0433",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
          },
          {
            "name": "ADV-2011-0966",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0966"
          },
          {
            "name": "44040",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44040"
          },
          {
            "name": "DSA-2213",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2213"
          },
          {
            "name": "44082",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44082"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
          },
          {
            "name": "1025317",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025317"
          },
          {
            "name": "47189",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47189"
          },
          {
            "name": "FEDORA-2011-4871",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
          },
          {
            "name": "44123",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44123"
          },
          {
            "name": "ADV-2011-0880",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0880"
          },
          {
            "name": "ADV-2011-0906",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0906"
          },
          {
            "name": "44012",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44012"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
          },
          {
            "name": "44010",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44010"
          },
          {
            "name": "xorg11-xrdb-command-execution(66585)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
          },
          {
            "name": "USN-1107-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1107-1"
          },
          {
            "name": "SSA:2011-096-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
          },
          {
            "name": "ADV-2011-0889",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0889"
          },
          {
            "name": "ADV-2011-0929",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0929"
          },
          {
            "name": "44122",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44122"
          },
          {
            "name": "[xorg-announce] 20110405 xrdb 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
          },
          {
            "name": "MDVSA-2011:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
          },
          {
            "name": "RHSA-2011:0432",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
          },
          {
            "name": "ADV-2011-0975",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0975"
          },
          {
            "name": "44193",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44193"
          },
          {
            "name": "SUSE-SA:2011:016",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
          },
          {
            "name": "openSUSE-SU-2011:0298",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "https://lwn.net/Articles/437150/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[xorg-announce] 20110405 X.Org security advisory: root hole via rogue hostname",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
        },
        {
          "name": "RHSA-2011:0433",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
        },
        {
          "name": "ADV-2011-0966",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0966"
        },
        {
          "name": "44040",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44040"
        },
        {
          "name": "DSA-2213",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2213"
        },
        {
          "name": "44082",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44082"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
        },
        {
          "name": "1025317",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025317"
        },
        {
          "name": "47189",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47189"
        },
        {
          "name": "FEDORA-2011-4871",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
        },
        {
          "name": "44123",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44123"
        },
        {
          "name": "ADV-2011-0880",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0880"
        },
        {
          "name": "ADV-2011-0906",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0906"
        },
        {
          "name": "44012",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44012"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
        },
        {
          "name": "44010",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44010"
        },
        {
          "name": "xorg11-xrdb-command-execution(66585)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
        },
        {
          "name": "USN-1107-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1107-1"
        },
        {
          "name": "SSA:2011-096-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
        },
        {
          "name": "ADV-2011-0889",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0889"
        },
        {
          "name": "ADV-2011-0929",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0929"
        },
        {
          "name": "44122",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44122"
        },
        {
          "name": "[xorg-announce] 20110405 xrdb 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
        },
        {
          "name": "MDVSA-2011:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
        },
        {
          "name": "RHSA-2011:0432",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
        },
        {
          "name": "ADV-2011-0975",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0975"
        },
        {
          "name": "44193",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44193"
        },
        {
          "name": "SUSE-SA:2011:016",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
        },
        {
          "name": "openSUSE-SU-2011:0298",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "https://lwn.net/Articles/437150/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0465",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[xorg-announce] 20110405 X.Org security advisory: root hole via rogue hostname",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
            },
            {
              "name": "RHSA-2011:0433",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
            },
            {
              "name": "ADV-2011-0966",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0966"
            },
            {
              "name": "44040",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44040"
            },
            {
              "name": "DSA-2213",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2213"
            },
            {
              "name": "44082",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44082"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680196",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
            },
            {
              "name": "1025317",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025317"
            },
            {
              "name": "47189",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47189"
            },
            {
              "name": "FEDORA-2011-4871",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
            },
            {
              "name": "44123",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44123"
            },
            {
              "name": "ADV-2011-0880",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0880"
            },
            {
              "name": "ADV-2011-0906",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0906"
            },
            {
              "name": "44012",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44012"
            },
            {
              "name": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56",
              "refsource": "CONFIRM",
              "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
            },
            {
              "name": "44010",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44010"
            },
            {
              "name": "xorg11-xrdb-command-execution(66585)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
            },
            {
              "name": "USN-1107-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1107-1"
            },
            {
              "name": "SSA:2011-096-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
            },
            {
              "name": "ADV-2011-0889",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0889"
            },
            {
              "name": "ADV-2011-0929",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0929"
            },
            {
              "name": "44122",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44122"
            },
            {
              "name": "[xorg-announce] 20110405 xrdb 1.0.9",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
            },
            {
              "name": "MDVSA-2011:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
            },
            {
              "name": "RHSA-2011:0432",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
            },
            {
              "name": "ADV-2011-0975",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0975"
            },
            {
              "name": "44193",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44193"
            },
            {
              "name": "SUSE-SA:2011:016",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
            },
            {
              "name": "openSUSE-SU-2011:0298",
              "refsource": "SUSE",
              "url": "https://lwn.net/Articles/437150/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0465",
    "datePublished": "2011-04-08T15:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.842Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2362 (GCVE-0-2008-2362)

Vulnerability from cvelistv5 – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:58
VLAI?
Summary
Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://www.securityfocus.com/bid/29670 vdb-entryx_refsource_BID
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://securitytracker.com/id?1020245 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:58:02.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "29670",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29670"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "name": "oval:org.mitre.oval:def:11246",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
          },
          {
            "name": "1020245",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020245"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "name": "20080611 Multiple Vendor X Server Render Extension Gradient Creation Integer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "MDVSA-2008:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "29670",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29670"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "name": "oval:org.mitre.oval:def:11246",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
        },
        {
          "name": "1020245",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020245"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "name": "20080611 Multiple Vendor X Server Render Extension Gradient Creation Integer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "MDVSA-2008:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-2362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "29670",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29670"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "oval:org.mitre.oval:def:11246",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
            },
            {
              "name": "1020245",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020245"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "20080611 Multiple Vendor X Server Render Extension Gradient Creation Integer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "MDVSA-2008:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-2362",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-05-21T00:00:00",
    "dateUpdated": "2024-08-07T08:58:02.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1379 (GCVE-0-2008-1379)

Vulnerability from cvelistv5 – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1020246 vdb-entryx_refsource_SECTRACK
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://secunia.com/advisories/30629 third-party-advisoryx_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2008-0502.html vendor-advisoryx_refsource_REDHAT
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-05… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30628 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/3000 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/29669 vdb-entryx_refsource_BID
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/32545 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2008-0512.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.606Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1020246",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020246"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "30629",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30629"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "MDVSA-2008:115",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
          },
          {
            "name": "RHSA-2008:0502",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
          },
          {
            "name": "SSRT080083",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "20080611 Multiple Vendor X Server MIT-SHM Extension Information Disclosure Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "xorg-fbshmputimage-information-disclosure(43016)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "name": "oval:org.mitre.oval:def:8966",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "name": "HPSBUX02381",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "name": "RHSA-2008:0503",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
          },
          {
            "name": "30628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30628"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "MDVSA-2008:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
          },
          {
            "name": "ADV-2008-3000",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3000"
          },
          {
            "name": "29669",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29669"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "32545",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32545"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "RHSA-2008:0512",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "1020246",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020246"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "30629",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30629"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "MDVSA-2008:115",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
        },
        {
          "name": "RHSA-2008:0502",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
        },
        {
          "name": "SSRT080083",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "20080611 Multiple Vendor X Server MIT-SHM Extension Information Disclosure Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "xorg-fbshmputimage-information-disclosure(43016)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "name": "oval:org.mitre.oval:def:8966",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "name": "HPSBUX02381",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "name": "RHSA-2008:0503",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
        },
        {
          "name": "30628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30628"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "MDVSA-2008:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
        },
        {
          "name": "ADV-2008-3000",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3000"
        },
        {
          "name": "29669",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29669"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "32545",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32545"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "RHSA-2008:0512",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-1379",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1020246",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020246"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "30629",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30629"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "MDVSA-2008:115",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
            },
            {
              "name": "RHSA-2008:0502",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
            },
            {
              "name": "SSRT080083",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "20080611 Multiple Vendor X Server MIT-SHM Extension Information Disclosure Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "xorg-fbshmputimage-information-disclosure(43016)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "oval:org.mitre.oval:def:8966",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "HPSBUX02381",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "RHSA-2008:0503",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
            },
            {
              "name": "30628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30628"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "MDVSA-2008:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
            },
            {
              "name": "ADV-2008-3000",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3000"
            },
            {
              "name": "29669",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29669"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "32545",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32545"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "RHSA-2008:0512",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-1379",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-03-18T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.606Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1377 (GCVE-0-2008-1377)

Vulnerability from cvelistv5 – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://secunia.com/advisories/30629 third-party-advisoryx_refsource_SECUNIA
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0502.html vendor-advisoryx_refsource_REDHAT
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1020247 vdb-entryx_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2008-05… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30628 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/3000 vdb-entryx_refsource_VUPEN
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/32545 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2008-0512.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.564Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "30629",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30629"
          },
          {
            "name": "20080611 Multiple Vendor X Server Record and Security Extensions Multiple Memory Corruption Vulnerabilities",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
          },
          {
            "name": "oval:org.mitre.oval:def:10109",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "MDVSA-2008:115",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "name": "RHSA-2008:0502",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
          },
          {
            "name": "SSRT080083",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "name": "HPSBUX02381",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "name": "1020247",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020247"
          },
          {
            "name": "RHSA-2008:0503",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
          },
          {
            "name": "30628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30628"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "ADV-2008-3000",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3000"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "32545",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32545"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "RHSA-2008:0512",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "30629",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30629"
        },
        {
          "name": "20080611 Multiple Vendor X Server Record and Security Extensions Multiple Memory Corruption Vulnerabilities",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
        },
        {
          "name": "oval:org.mitre.oval:def:10109",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "MDVSA-2008:115",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "name": "RHSA-2008:0502",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
        },
        {
          "name": "SSRT080083",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "name": "HPSBUX02381",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "name": "1020247",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020247"
        },
        {
          "name": "RHSA-2008:0503",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
        },
        {
          "name": "30628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30628"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "ADV-2008-3000",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3000"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "32545",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32545"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "RHSA-2008:0512",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-1377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "30629",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30629"
            },
            {
              "name": "20080611 Multiple Vendor X Server Record and Security Extensions Multiple Memory Corruption Vulnerabilities",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
            },
            {
              "name": "oval:org.mitre.oval:def:10109",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "MDVSA-2008:115",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "RHSA-2008:0502",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
            },
            {
              "name": "SSRT080083",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "HPSBUX02381",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "1020247",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020247"
            },
            {
              "name": "RHSA-2008:0503",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
            },
            {
              "name": "30628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30628"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "ADV-2008-3000",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3000"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "32545",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32545"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "RHSA-2008:0512",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-1377",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-03-18T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.564Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2360 (GCVE-0-2008-2360)

Vulnerability from cvelistv5 – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:58
VLAI?
Summary
Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://secunia.com/advisories/30629 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://rhn.redhat.com/errata/RHSA-2008-0502.html vendor-advisoryx_refsource_REDHAT
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://securitytracker.com/id?1020243 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-05… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30628 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2008-0512.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:58:02.415Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "30629",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30629"
          },
          {
            "name": "oval:org.mitre.oval:def:9329",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "MDVSA-2008:115",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "name": "20080611 Multiple Vendor X Server Render Extension AllocateGlyph() Integer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
          },
          {
            "name": "RHSA-2008:0502",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "1020243",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020243"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
          },
          {
            "name": "RHSA-2008:0503",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
          },
          {
            "name": "30628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30628"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "MDVSA-2008:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "RHSA-2008:0512",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "30629",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30629"
        },
        {
          "name": "oval:org.mitre.oval:def:9329",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "MDVSA-2008:115",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "name": "20080611 Multiple Vendor X Server Render Extension AllocateGlyph() Integer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
        },
        {
          "name": "RHSA-2008:0502",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "1020243",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020243"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
        },
        {
          "name": "RHSA-2008:0503",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
        },
        {
          "name": "30628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30628"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "MDVSA-2008:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "RHSA-2008:0512",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-2360",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "30629",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30629"
            },
            {
              "name": "oval:org.mitre.oval:def:9329",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "MDVSA-2008:115",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "20080611 Multiple Vendor X Server Render Extension AllocateGlyph() Integer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
            },
            {
              "name": "RHSA-2008:0502",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "1020243",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020243"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
            },
            {
              "name": "RHSA-2008:0503",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
            },
            {
              "name": "30628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30628"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "MDVSA-2008:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "RHSA-2008:0512",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-2360",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-05-21T00:00:00",
    "dateUpdated": "2024-08-07T08:58:02.415Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0465 (GCVE-0-2011-0465)

Vulnerability from nvd – Published: 2011-04-08 15:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.freedesktop.org/archives/xorg-announ… mailing-listx_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2011-04… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0966 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44040 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2213 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/44082 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=680196 x_refsource_CONFIRM
http://www.securitytracker.com/id?1025317 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/47189 vdb-entryx_refsource_BID
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/44123 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0880 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0906 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44012 third-party-advisoryx_refsource_SECUNIA
http://cgit.freedesktop.org/xorg/app/xrdb/commit/… x_refsource_CONFIRM
http://secunia.com/advisories/44010 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.ubuntu.com/usn/USN-1107-1 vendor-advisoryx_refsource_UBUNTU
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.vupen.com/english/advisories/2011/0889 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0929 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44122 third-party-advisoryx_refsource_SECUNIA
http://lists.freedesktop.org/archives/xorg-announ… mailing-listx_refsource_MLIST
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2011-04… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0975 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/44193 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://lwn.net/Articles/437150/ vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.842Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[xorg-announce] 20110405 X.Org security advisory: root hole via rogue hostname",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
          },
          {
            "name": "RHSA-2011:0433",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
          },
          {
            "name": "ADV-2011-0966",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0966"
          },
          {
            "name": "44040",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44040"
          },
          {
            "name": "DSA-2213",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2213"
          },
          {
            "name": "44082",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44082"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
          },
          {
            "name": "1025317",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025317"
          },
          {
            "name": "47189",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47189"
          },
          {
            "name": "FEDORA-2011-4871",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
          },
          {
            "name": "44123",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44123"
          },
          {
            "name": "ADV-2011-0880",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0880"
          },
          {
            "name": "ADV-2011-0906",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0906"
          },
          {
            "name": "44012",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44012"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
          },
          {
            "name": "44010",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44010"
          },
          {
            "name": "xorg11-xrdb-command-execution(66585)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
          },
          {
            "name": "USN-1107-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1107-1"
          },
          {
            "name": "SSA:2011-096-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
          },
          {
            "name": "ADV-2011-0889",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0889"
          },
          {
            "name": "ADV-2011-0929",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0929"
          },
          {
            "name": "44122",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44122"
          },
          {
            "name": "[xorg-announce] 20110405 xrdb 1.0.9",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
          },
          {
            "name": "MDVSA-2011:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
          },
          {
            "name": "RHSA-2011:0432",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
          },
          {
            "name": "ADV-2011-0975",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0975"
          },
          {
            "name": "44193",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44193"
          },
          {
            "name": "SUSE-SA:2011:016",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
          },
          {
            "name": "openSUSE-SU-2011:0298",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "https://lwn.net/Articles/437150/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[xorg-announce] 20110405 X.Org security advisory: root hole via rogue hostname",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
        },
        {
          "name": "RHSA-2011:0433",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
        },
        {
          "name": "ADV-2011-0966",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0966"
        },
        {
          "name": "44040",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44040"
        },
        {
          "name": "DSA-2213",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2213"
        },
        {
          "name": "44082",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44082"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
        },
        {
          "name": "1025317",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025317"
        },
        {
          "name": "47189",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47189"
        },
        {
          "name": "FEDORA-2011-4871",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
        },
        {
          "name": "44123",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44123"
        },
        {
          "name": "ADV-2011-0880",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0880"
        },
        {
          "name": "ADV-2011-0906",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0906"
        },
        {
          "name": "44012",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44012"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
        },
        {
          "name": "44010",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44010"
        },
        {
          "name": "xorg11-xrdb-command-execution(66585)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
        },
        {
          "name": "USN-1107-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1107-1"
        },
        {
          "name": "SSA:2011-096-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
        },
        {
          "name": "ADV-2011-0889",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0889"
        },
        {
          "name": "ADV-2011-0929",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0929"
        },
        {
          "name": "44122",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44122"
        },
        {
          "name": "[xorg-announce] 20110405 xrdb 1.0.9",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
        },
        {
          "name": "MDVSA-2011:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
        },
        {
          "name": "RHSA-2011:0432",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
        },
        {
          "name": "ADV-2011-0975",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0975"
        },
        {
          "name": "44193",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44193"
        },
        {
          "name": "SUSE-SA:2011:016",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
        },
        {
          "name": "openSUSE-SU-2011:0298",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "https://lwn.net/Articles/437150/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0465",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[xorg-announce] 20110405 X.Org security advisory: root hole via rogue hostname",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html"
            },
            {
              "name": "RHSA-2011:0433",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0433.html"
            },
            {
              "name": "ADV-2011-0966",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0966"
            },
            {
              "name": "44040",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44040"
            },
            {
              "name": "DSA-2213",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2213"
            },
            {
              "name": "44082",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44082"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680196",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680196"
            },
            {
              "name": "1025317",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025317"
            },
            {
              "name": "47189",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/47189"
            },
            {
              "name": "FEDORA-2011-4871",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html"
            },
            {
              "name": "44123",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44123"
            },
            {
              "name": "ADV-2011-0880",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0880"
            },
            {
              "name": "ADV-2011-0906",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0906"
            },
            {
              "name": "44012",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44012"
            },
            {
              "name": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56",
              "refsource": "CONFIRM",
              "url": "http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56"
            },
            {
              "name": "44010",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44010"
            },
            {
              "name": "xorg11-xrdb-command-execution(66585)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66585"
            },
            {
              "name": "USN-1107-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1107-1"
            },
            {
              "name": "SSA:2011-096-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.465748"
            },
            {
              "name": "ADV-2011-0889",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0889"
            },
            {
              "name": "ADV-2011-0929",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0929"
            },
            {
              "name": "44122",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44122"
            },
            {
              "name": "[xorg-announce] 20110405 xrdb 1.0.9",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html"
            },
            {
              "name": "MDVSA-2011:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:076"
            },
            {
              "name": "RHSA-2011:0432",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0432.html"
            },
            {
              "name": "ADV-2011-0975",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0975"
            },
            {
              "name": "44193",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44193"
            },
            {
              "name": "SUSE-SA:2011:016",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html"
            },
            {
              "name": "openSUSE-SU-2011:0298",
              "refsource": "SUSE",
              "url": "https://lwn.net/Articles/437150/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0465",
    "datePublished": "2011-04-08T15:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.842Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2362 (GCVE-0-2008-2362)

Vulnerability from nvd – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:58
VLAI?
Summary
Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://www.securityfocus.com/bid/29670 vdb-entryx_refsource_BID
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://securitytracker.com/id?1020245 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:58:02.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "29670",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29670"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "name": "oval:org.mitre.oval:def:11246",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
          },
          {
            "name": "1020245",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020245"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "name": "20080611 Multiple Vendor X Server Render Extension Gradient Creation Integer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "MDVSA-2008:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "29670",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29670"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "name": "oval:org.mitre.oval:def:11246",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
        },
        {
          "name": "1020245",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020245"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "name": "20080611 Multiple Vendor X Server Render Extension Gradient Creation Integer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "MDVSA-2008:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-2362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "29670",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29670"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "oval:org.mitre.oval:def:11246",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11246"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2362.diff"
            },
            {
              "name": "1020245",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020245"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "20080611 Multiple Vendor X Server Render Extension Gradient Creation Integer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=720"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "MDVSA-2008:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-2362",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-05-21T00:00:00",
    "dateUpdated": "2024-08-07T08:58:02.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1379 (GCVE-0-2008-1379)

Vulnerability from nvd – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1020246 vdb-entryx_refsource_SECTRACK
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://secunia.com/advisories/30629 third-party-advisoryx_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2008-0502.html vendor-advisoryx_refsource_REDHAT
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-05… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30628 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/3000 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/29669 vdb-entryx_refsource_BID
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/32545 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2008-0512.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.606Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1020246",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020246"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "30629",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30629"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "MDVSA-2008:115",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
          },
          {
            "name": "RHSA-2008:0502",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
          },
          {
            "name": "SSRT080083",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "20080611 Multiple Vendor X Server MIT-SHM Extension Information Disclosure Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "xorg-fbshmputimage-information-disclosure(43016)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "name": "oval:org.mitre.oval:def:8966",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "name": "HPSBUX02381",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "name": "RHSA-2008:0503",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
          },
          {
            "name": "30628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30628"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "MDVSA-2008:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
          },
          {
            "name": "ADV-2008-3000",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3000"
          },
          {
            "name": "29669",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29669"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "32545",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32545"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "RHSA-2008:0512",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "1020246",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020246"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "30629",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30629"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "MDVSA-2008:115",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
        },
        {
          "name": "RHSA-2008:0502",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
        },
        {
          "name": "SSRT080083",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "20080611 Multiple Vendor X Server MIT-SHM Extension Information Disclosure Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "xorg-fbshmputimage-information-disclosure(43016)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "name": "oval:org.mitre.oval:def:8966",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "name": "HPSBUX02381",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "name": "RHSA-2008:0503",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
        },
        {
          "name": "30628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30628"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "MDVSA-2008:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
        },
        {
          "name": "ADV-2008-3000",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3000"
        },
        {
          "name": "29669",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29669"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "32545",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32545"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "RHSA-2008:0512",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-1379",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1020246",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020246"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "30629",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30629"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "MDVSA-2008:115",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1379.diff"
            },
            {
              "name": "RHSA-2008:0502",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
            },
            {
              "name": "SSRT080083",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "20080611 Multiple Vendor X Server MIT-SHM Extension Information Disclosure Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "xorg-fbshmputimage-information-disclosure(43016)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43016"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "oval:org.mitre.oval:def:8966",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8966"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "HPSBUX02381",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "RHSA-2008:0503",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
            },
            {
              "name": "30628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30628"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "MDVSA-2008:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
            },
            {
              "name": "ADV-2008-3000",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3000"
            },
            {
              "name": "29669",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29669"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "32545",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32545"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "RHSA-2008:0512",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-1379",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-03-18T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.606Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1377 (GCVE-0-2008-1377)

Vulnerability from nvd – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://secunia.com/advisories/30629 third-party-advisoryx_refsource_SECUNIA
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0502.html vendor-advisoryx_refsource_REDHAT
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1020247 vdb-entryx_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2008-05… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30628 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/3000 vdb-entryx_refsource_VUPEN
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/32545 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2008-0512.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.564Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "30629",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30629"
          },
          {
            "name": "20080611 Multiple Vendor X Server Record and Security Extensions Multiple Memory Corruption Vulnerabilities",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
          },
          {
            "name": "oval:org.mitre.oval:def:10109",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "MDVSA-2008:115",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "name": "RHSA-2008:0502",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
          },
          {
            "name": "SSRT080083",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "name": "HPSBUX02381",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "name": "1020247",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020247"
          },
          {
            "name": "RHSA-2008:0503",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
          },
          {
            "name": "30628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30628"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "ADV-2008-3000",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3000"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "32545",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32545"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "RHSA-2008:0512",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "30629",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30629"
        },
        {
          "name": "20080611 Multiple Vendor X Server Record and Security Extensions Multiple Memory Corruption Vulnerabilities",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
        },
        {
          "name": "oval:org.mitre.oval:def:10109",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "MDVSA-2008:115",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "name": "RHSA-2008:0502",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
        },
        {
          "name": "SSRT080083",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "name": "HPSBUX02381",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "name": "1020247",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020247"
        },
        {
          "name": "RHSA-2008:0503",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
        },
        {
          "name": "30628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30628"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "ADV-2008-3000",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3000"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "32545",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32545"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "RHSA-2008:0512",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-1377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "30629",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30629"
            },
            {
              "name": "20080611 Multiple Vendor X Server Record and Security Extensions Multiple Memory Corruption Vulnerabilities",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721"
            },
            {
              "name": "oval:org.mitre.oval:def:10109",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10109"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "MDVSA-2008:115",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "RHSA-2008:0502",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
            },
            {
              "name": "SSRT080083",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "HPSBUX02381",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-1377.diff"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "1020247",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020247"
            },
            {
              "name": "RHSA-2008:0503",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
            },
            {
              "name": "30628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30628"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "ADV-2008-3000",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3000"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "32545",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32545"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "RHSA-2008:0512",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-1377",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-03-18T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.564Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2360 (GCVE-0-2008-2360)

Vulnerability from nvd – Published: 2008-06-16 19:00 – Updated: 2024-08-07 08:58
VLAI?
Summary
Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://issues.rpath.com/browse/RPL-2607 x_refsource_CONFIRM
http://secunia.com/advisories/30629 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33937 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30664 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/493550/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/31025 third-party-advisoryx_refsource_SECUNIA
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://rhn.redhat.com/errata/RHSA-2008-0502.html vendor-advisoryx_refsource_REDHAT
http://support.apple.com/kb/HT3438 x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://www.vupen.com/english/advisories/2008/1833 vdb-entryx_refsource_VUPEN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200806-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/30715 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30666 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30627 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30637 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/1803 vdb-entryx_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://securitytracker.com/id?1020243 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/30772 third-party-advisoryx_refsource_SECUNIA
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patche… x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-05… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30628 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30659 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/31109 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1983… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30671 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/30809 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://lists.freedesktop.org/archives/xorg/2008-J… mailing-listx_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2008-0504.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/30843 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1595 vendor-advisoryx_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-616-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2619 x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2008-0512.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/493548/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/30630 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20080… vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:58:02.415Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2607"
          },
          {
            "name": "30629",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30629"
          },
          {
            "name": "oval:org.mitre.oval:def:9329",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
          },
          {
            "name": "238686",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
          },
          {
            "name": "33937",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33937"
          },
          {
            "name": "30664",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30664"
          },
          {
            "name": "MDVSA-2008:115",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
          },
          {
            "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
          },
          {
            "name": "31025",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31025"
          },
          {
            "name": "20080611 Multiple Vendor X Server Render Extension AllocateGlyph() Integer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
          },
          {
            "name": "RHSA-2008:0502",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3438"
          },
          {
            "name": "APPLE-SA-2009-02-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
          },
          {
            "name": "ADV-2008-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1833"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
          },
          {
            "name": "GLSA-200806-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
          },
          {
            "name": "30715",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30715"
          },
          {
            "name": "30666",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30666"
          },
          {
            "name": "30627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30627"
          },
          {
            "name": "30637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30637"
          },
          {
            "name": "MDVSA-2008:116",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
          },
          {
            "name": "ADV-2008-1803",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1803"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
          },
          {
            "name": "SUSE-SA:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
          },
          {
            "name": "1020243",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020243"
          },
          {
            "name": "30772",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30772"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
          },
          {
            "name": "RHSA-2008:0503",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
          },
          {
            "name": "30628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30628"
          },
          {
            "name": "30659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30659"
          },
          {
            "name": "31109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31109"
          },
          {
            "name": "ADV-2008-1983",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1983/references"
          },
          {
            "name": "30671",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30671"
          },
          {
            "name": "30809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30809"
          },
          {
            "name": "MDVSA-2008:179",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
          },
          {
            "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
          },
          {
            "name": "RHSA-2008:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
          },
          {
            "name": "30843",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30843"
          },
          {
            "name": "DSA-1595",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1595"
          },
          {
            "name": "USN-616-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-616-1"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2619"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          },
          {
            "name": "RHSA-2008:0512",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
          },
          {
            "name": "20080620 rPSA-2008-0200-1 xorg-server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
          },
          {
            "name": "30630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30630"
          },
          {
            "name": "GLSA-200807-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2607"
        },
        {
          "name": "30629",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30629"
        },
        {
          "name": "oval:org.mitre.oval:def:9329",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
        },
        {
          "name": "238686",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
        },
        {
          "name": "33937",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33937"
        },
        {
          "name": "30664",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30664"
        },
        {
          "name": "MDVSA-2008:115",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
        },
        {
          "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
        },
        {
          "name": "31025",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31025"
        },
        {
          "name": "20080611 Multiple Vendor X Server Render Extension AllocateGlyph() Integer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
        },
        {
          "name": "RHSA-2008:0502",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3438"
        },
        {
          "name": "APPLE-SA-2009-02-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
        },
        {
          "name": "ADV-2008-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1833"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
        },
        {
          "name": "GLSA-200806-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
        },
        {
          "name": "30715",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30715"
        },
        {
          "name": "30666",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30666"
        },
        {
          "name": "30627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30627"
        },
        {
          "name": "30637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30637"
        },
        {
          "name": "MDVSA-2008:116",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
        },
        {
          "name": "ADV-2008-1803",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1803"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
        },
        {
          "name": "SUSE-SA:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
        },
        {
          "name": "1020243",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020243"
        },
        {
          "name": "30772",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30772"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
        },
        {
          "name": "RHSA-2008:0503",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
        },
        {
          "name": "30628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30628"
        },
        {
          "name": "30659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30659"
        },
        {
          "name": "31109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31109"
        },
        {
          "name": "ADV-2008-1983",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1983/references"
        },
        {
          "name": "30671",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30671"
        },
        {
          "name": "30809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30809"
        },
        {
          "name": "MDVSA-2008:179",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
        },
        {
          "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
        },
        {
          "name": "RHSA-2008:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
        },
        {
          "name": "30843",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30843"
        },
        {
          "name": "DSA-1595",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1595"
        },
        {
          "name": "USN-616-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-616-1"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2619"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        },
        {
          "name": "RHSA-2008:0512",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
        },
        {
          "name": "20080620 rPSA-2008-0200-1 xorg-server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
        },
        {
          "name": "30630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30630"
        },
        {
          "name": "GLSA-200807-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-2360",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://issues.rpath.com/browse/RPL-2607",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2607"
            },
            {
              "name": "30629",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30629"
            },
            {
              "name": "oval:org.mitre.oval:def:9329",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9329"
            },
            {
              "name": "238686",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1"
            },
            {
              "name": "33937",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33937"
            },
            {
              "name": "30664",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30664"
            },
            {
              "name": "MDVSA-2008:115",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:115"
            },
            {
              "name": "20080621 rPSA-2008-0201-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493550/100/0/threaded"
            },
            {
              "name": "31025",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31025"
            },
            {
              "name": "20080611 Multiple Vendor X Server Render Extension AllocateGlyph() Integer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=718"
            },
            {
              "name": "RHSA-2008:0502",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0502.html"
            },
            {
              "name": "http://support.apple.com/kb/HT3438",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3438"
            },
            {
              "name": "APPLE-SA-2009-02-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
            },
            {
              "name": "ADV-2008-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1833"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201"
            },
            {
              "name": "GLSA-200806-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200806-07.xml"
            },
            {
              "name": "30715",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30715"
            },
            {
              "name": "30666",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30666"
            },
            {
              "name": "30627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30627"
            },
            {
              "name": "30637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30637"
            },
            {
              "name": "MDVSA-2008:116",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:116"
            },
            {
              "name": "ADV-2008-1803",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1803"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm"
            },
            {
              "name": "SUSE-SA:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html"
            },
            {
              "name": "1020243",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020243"
            },
            {
              "name": "30772",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30772"
            },
            {
              "name": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2360.diff"
            },
            {
              "name": "RHSA-2008:0503",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0503.html"
            },
            {
              "name": "30628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30628"
            },
            {
              "name": "30659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30659"
            },
            {
              "name": "31109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31109"
            },
            {
              "name": "ADV-2008-1983",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1983/references"
            },
            {
              "name": "30671",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30671"
            },
            {
              "name": "30809",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30809"
            },
            {
              "name": "MDVSA-2008:179",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:179"
            },
            {
              "name": "[xorg] 20080611 X.Org security advisory june 2008 - Multiple vulnerabilities in X server extensions",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg/2008-June/036026.html"
            },
            {
              "name": "RHSA-2008:0504",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0504.html"
            },
            {
              "name": "30843",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30843"
            },
            {
              "name": "DSA-1595",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1595"
            },
            {
              "name": "USN-616-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-616-1"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2619",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2619"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            },
            {
              "name": "RHSA-2008:0512",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0512.html"
            },
            {
              "name": "20080620 rPSA-2008-0200-1 xorg-server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493548/100/0/threaded"
            },
            {
              "name": "30630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30630"
            },
            {
              "name": "GLSA-200807-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-2360",
    "datePublished": "2008-06-16T19:00:00",
    "dateReserved": "2008-05-21T00:00:00",
    "dateUpdated": "2024-08-07T08:58:02.415Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}