X.Org X11 BDF font buffer overflow

xorg-bdf-font-bo (33417) The risk level is classified as HighHigh Risk

Description:

X.Org X11 is vulnerable to a heap-based buffer overflow, caused by an integer overflow vulnerability in the parsing of BDF fonts. By creating a specially-crafted BDF font file and persuading a victim to open the file, a local attacker could overflow a buffer and execute arbitrary code on the system with ROOT privileges or cause the system to crash.

*CVSS:

Base Score: 5.6
  Access Vector: Local
  Access Complexity: High
  Authentication: Not Required
  Confidentiality Impact: Complete
  Integrity Impact: Complete
  Availability Impact: Complete
 
Temporal Score: 4.1
  Exploitability: Unproven
  Remediation Level: Official-Fix
  Report Confidence: Confirmed

Consequences:

Gain Privileges

Remedy:

Upgrade to the latest version of X.Org X11 (7.2 or later), or apply the appropriate patch for your system, available from the X.Org Foundation Web site. See References.

For Apple Safari:
Upgrade to the latest version of Apple Safari (3.0.4 beta or later), available from the Apple Web site. See References.

For Red Hat Linux (libXfont):
Refer to RHSA-2007:0132 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux (X.org):
Refer to RHSA-2007:0126 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux (XFree86):
Refer to RHSA-2007:0125 for patch, upgrade, or suggested workaround information. See References.

For Ubuntu Linux:
Refer to USN-448-1 for patch, upgrade, or suggested workaround information. See References.

For Mandriva Linux (freetype2):
Refer to MDKSA-2007:081 for patch, upgrade, or suggested workaround information. See References.

For Mandriva Linux (tightvnc):
Refer to MDKSA-2007:080 for patch, upgrade, or suggested workaround information. See References.

For Mandriva Linux (xorg-x11/XFree86):
Refer to MDKSA-2007:079 for patch, upgrade, or suggested workaround information. See References.

For Sun Solaris:
Refer to Sun Alert ID: 102886 for patch, upgrade, or suggested workaround information. See References.

For Gentoo Linux (tightvnc, libxfont):
Refer to GLSA 200705-10 for patch, upgrade, or suggested workaround information. See References.

For Gentoo Linux (freetype):
Refer to GLSA 200705-02 for patch, upgrade, or suggested workaround information. See References.

For Turbolinux (xorg-x11, XFree86):
Refer to TLSA-2007-26 for patch, upgrade, or suggested workaround information. See References.

For Debian GNU/Linux (xfree86):
Refer to DSA-1294-1 for patch, upgrade, or suggested workaround information. See References.

For Avaya (freetype):
Refer to ASA-2007-193 for patch, upgrade, or suggested workaround information. See References.

For dia Win32 Installer:
Upgrade to the latest version of dia Win32 Installer (0.96.1-6 or later), as listed in SourceForge.net: Files. See References.

For other distributions:
Apply the appropriate update for your system. See References.

References:

  • Apple Web site: About the security content of Safari 3 Beta Update 3.0.4.
  • Apple Web site: About the security content of Security Update 2009-001 .
  • iDefense Labs PUBLIC ADVISORY: 04.03.07: Multiple Vendor X Server BDF Font Parsing Integer Overflow Vulnerability.
  • SourceForge.net: Files: dia Win32 Installer - File Release Notes and Changelog - Release Name: 0.96.1-6.
  • Sun Alert ID: 102886: Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1).
  • X.Org Foundation Web site: X.Org Wiki - Home.
  • ASA-2007-141: xorg-x11 security update (RHSA-2007-0126)
  • ASA-2007-167: XFree86 security update (RHSA-2007-0125)
  • ASA-2007-178: Multiple vulnerabilities in libfreetype Xsun(1)sand Xorg(1) (Sun 102886)
  • ASA-2007-193: freetype security update (RHSA-2007-0150)
  • BID-23283: X.Org LibXFont Multiple Local Integer Overflow Vulnerabilities
  • BID-23300: ImageMagick XGetPixel/XInitImage Multiple Integer Overflow Vulnerabilities
  • BID-23402: RETIRED: Freetype Font Files Integer Overflow Vulnerability
  • CVE-2007-1351: Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
  • CVE-2007-3408: Multiple unspecified vulnerabilities in Dia before 0.96.1-6 have unspecified attack vectors and impact, probably involving the use of vulnerable FreeType libraries that contain CVE-2007-2754 and/or CVE-2007-1351.
  • DSA-1294: xfree86 -- several vulnerabilities
  • DSA-1454: freetype -- integer overflow
  • GLSA-200705-02: FreeType: User-assisted execution of arbitrary code
  • GLSA-200705-10: LibXfont, TightVNC: Multiple vulnerabilities
  • GLSA-200805-07: Linux Terminal Server Project: Multiple vulnerabilities
  • MDKSA-2007:079: Updated xorg-x11/XFree86 packages fix integer overflow vulnerabilities
  • MDKSA-2007:079-1: Updated xorg-x11/XFree86 packages fix integer overflow vulnerabilities
  • MDKSA-2007:080: Updated tightvnc packages fix integer overflow vulnerabilities
  • MDKSA-2007:080-1: Updated tightvnc packages fix integer overflow vulnerabilities
  • MDKSA-2007:081: Updated freetype2 packages fix vulnerability
  • MDKSA-2007:081-1: Updated freetype2 packages fix vulnerability
  • RHSA-2007-0125: Important: XFree86 security update
  • RHSA-2007-0126: Important: xorg-x11 security update
  • RHSA-2007-0132: Important: libXfont security update
  • RHSA-2007-0150: Moderate: freetype security update
  • SA24741: X.Org X11 Multiple Vulnerabilities
  • SA24758: XFree86 Multiple Vulnerabilities
  • SA24768: FreeType BDF Font Integer Overflow Vulnerability
  • SA25006: Sun Solaris X11 Multiple Vulnerabilities
  • SA25216: Avaya CMS / IR X.Org X11 Multiple Vulnerabilities
  • SA25495: Avaya Products FreeType BDF Font Integer Overflow Vulnerability
  • SA25810: Dia FreeType Font Parsing Vulnerabilities
  • SA30161: Gentoo ltsp Multiple Vulnerabilities
  • SA33937: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
  • SECTRACK ID: 1017857: X11 Overflows Let Local Users Gain Root Privileges
  • SUSE-SA:2007:027: XFree86Xorg security problems
  • SUSE-SR:2007:006: SUSE Security Summary Report

Platforms Affected:

  • Apple Mac OS X 10.4.11
  • Apple Mac OS X Server 10.4.11
  • Avaya Communication Manager 2.0
  • Avaya Communication Manager 2.0.1
  • Avaya Communication Manager 2.1
  • Avaya Communication Manager 2.1.1
  • Avaya Communication Manager 2.2
  • Avaya Communication Manager 2.2.1
  • Avaya Communication Manager 2.2.2
  • Avaya Communication Manager 3.0
  • Avaya Expanded Meet-Me Conferencing
  • Avaya Intuity Audix LX
  • Avaya Message Networking
  • Avaya Message Storage Server
  • Canonical Ubuntu 5.10
  • Canonical Ubuntu 6.06 LTS
  • Canonical Ubuntu 6.10
  • Debian Debian Linux 3.1
  • Debian Debian Linux 4.0
  • Gentoo Linux
  • MandrakeSoft Mandrake Linux 2007 X86_64
  • MandrakeSoft Mandrake Linux 2007
  • MandrakeSoft Mandrake Linux 2007.1
  • MandrakeSoft Mandrake Linux 2007.1 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0
  • MandrakeSoft Mandrake Linux Corporate Server 4.0
  • MandrakeSoft Mandrake Linux Corporate Server 4.0 X86_64
  • MandrakeSoft Mandrake Multi Network Firewall 2.0
  • Novell Linux Desktop 9
  • Novell Linux POS 9
  • Novell Open Enterprise Server
  • Novell Open Enterprise Server
  • Novell OpenSUSE 10.2
  • Novell SLE SDK 10
  • Novell UnitedLinux 1.0
  • RedHat Enterprise Linux 2.1 AS
  • RedHat Enterprise Linux 2.1 ES
  • RedHat Enterprise Linux 2.1 WS
  • RedHat Enterprise Linux 3 AS
  • RedHat Enterprise Linux 3 Desktop
  • RedHat Enterprise Linux 3 WS
  • RedHat Enterprise Linux 3 ES
  • RedHat Enterprise Linux 4 WS
  • RedHat Enterprise Linux 4 ES
  • RedHat Enterprise Linux 4 AS
  • RedHat Enterprise Linux 4 Desktop
  • RedHat Enterprise Linux 5 Client Workstation
  • RedHat Enterprise Linux 5 Client
  • RedHat Enterprise Linux 5
  • RedHat Enterprise Linux Desktop 5.0
  • RedHat Linux Advanced Workstation 2.1 Itanium
  • Sun Solaris 10
  • Sun Solaris 8
  • Sun Solaris 9
  • SUSE SuSE Linux 9.0
  • SuSE SuSE Linux Retail Solution 8
  • SuSE SuSE SLED 10
  • SuSE SuSE SLES 10
  • SuSE SuSE SLES 9
  • Turbolinux Turbolinux 10 Desktop
  • Turbolinux Turbolinux 10 F...
  • Turbolinux Turbolinux 10 Server
  • Turbolinux Turbolinux 10 Server x64 Ed
  • Turbolinux Turbolinux 8 Server
  • Turbolinux Turbolinux FUJI
  • Turbolinux Turbolinux Home
  • Turbolinux Turbolinux Multimedia
  • Turbolinux Turbolinux Personal
  • Turbolinux Turbolinux wizpy
  • X.Org X11 R7.1

Reported:

Apr 03, 2007

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page

* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

About IBM Internet Security Systems

IBM Internet Security Systems is a trusted security advisor to thousands of the world's leading businesses and governments, helping to provide pre-emptive protection for networks, desktops and servers. The IBM Proventia? integrated security platform is designed to automatically protect against both known and unknown threats, helping to keep networks up and running and shield customers from online attacks before they impact business assets. IBM Internet Security Systems products and services are based on the proactive security intelligence of its X-Force? research and development team ? an unequivocal world authority in vulnerability and threat research. The IBM Internet Security Systems product line is also complemented by comprehensive Managed Security Services and Professional Security Services. For more information, visit the IBM Internet Security Systems Web site at www.iss.net or call 800-776-2362.