X.Org pixmap buffer overflow

xorg-pixmap-bo (22244) The risk level is classified as HighHigh Risk

Description:

X.Org is vulnerable to a heap-based buffer overflow in the pixmap memory allocation. By sending a large pixmap, a local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges.

Note: It is reported that XFree86 versions. 4.1.x through 4.5.x, X Windows System (X11) version 6.x as well as all versions of Avaya Modular Messaging Message Storage Server (MSS), Avaya Message Networking (all versions) and Avaya Intuity LX (all versions) are vulnerable to this as well.


Consequences:

Gain Access

Remedy:

For Gentoo Linux:
Upgrade to the latest version of Xorg-x11 (6.8.2-r3 or later), as listed in GLSA 200509-07. See References.

For Red Hat Linux 2.1 (AS, ES, WS and Advanced Workstation):
Upgrade to the latest version of XFree86 (4.1.0-73.EL or later). Refer to RHSA-2005:329-12 for more information. See References.

For Red Hat Linux (Xfree86):
Refer to RHSA-2005:501-20 or RHSA-2005:329-12 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux 4.0 (AS, ES, WS and Desktop):
Upgrade to the latest version of Xorg-x11 (6.8.2-1.EL.13.16 or later). Refer to RHSA-2005:396-9 for more information. See References.

For Debian GNU/Linux:
Upgrade to the latest version of XFfree86 as listed below. Refer to Debian/GNU Security Advisory DSA-816-1 for more information. See References.

Debian/GNU 3.0 (woody7): 4.1.0-16woody7 or later
Debian/GNU 3.1 (sarge): 4.3.0.dfsg.1-14sarge1 or later

For Ubuntu Linux:
Refer to USN-182-1 for patch, upgrade, or suggested workaround information. See References.

For SUSE Linux:
Refer to SUSE Security Announcement SUSE-SA:2005:056 for patch, upgrade, or suggested workaround information. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

Platforms Affected:

  • Avaya Intuity Audix LX
  • Avaya Message Networking
  • Avaya Modular Messaging
  • Canonical Ubuntu 4.10
  • Canonical Ubuntu 5.04
  • Debian Debian Linux 3.0
  • Debian Debian Linux 3.1
  • Gentoo Linux
  • MandrakeSoft Mandrake Linux 10.0 AMD64
  • MandrakeSoft Mandrake Linux 10.0
  • MandrakeSoft Mandrake Linux 10.1 X86_64
  • MandrakeSoft Mandrake Linux 10.1
  • MandrakeSoft Mandrake Linux LE2005 X86_64
  • MandrakeSoft Mandrake Linux LE2005
  • MandrakeSoft Mandrake Linux Corporate Server 2.1
  • MandrakeSoft Mandrake Linux Corporate Server 2.1 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0
  • Novell Linux Desktop 9
  • RedHat Enterprise Linux 2.1 AW
  • RedHat Enterprise Linux 2.1 ES
  • RedHat Enterprise Linux 2.1 AS
  • RedHat Enterprise Linux 2.1 WS
  • RedHat Enterprise Linux 3 ES
  • RedHat Enterprise Linux 3 AS
  • RedHat Enterprise Linux 3 WS
  • RedHat Enterprise Linux 3 Desktop
  • RedHat Enterprise Linux 4 ES
  • RedHat Enterprise Linux 4 Desktop
  • RedHat Enterprise Linux 4 AS
  • RedHat Enterprise Linux 4 WS
  • RedHat Linux Advanced Workstation 2.1 Itanium
  • SuSE Linux Enterprise Server 8
  • SuSE Linux Enterprise Server 9
  • SUSE SuSE Linux 9.0
  • SUSE SuSE Linux 9.1
  • SUSE SuSE Linux 9.2
  • SUSE SuSE Linux 9.3
  • SuSE SuSE Linux Desktop 1.0
  • X.Org X.Org Server 6.8.2 r3
  • X.Org X11 6.x
  • XFree86 XFree86 4.1.x to 4.5.x

Reported:

Sep 12, 2005

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page