CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
EPSS
Percentile
90.5%
Multiple X Window System servers contain a pixmap memory allocation flaw that may allow local users to execute code with elevated privileges.
Multiple X Window System server applications share code that may contain a flaw in the memory allocation for large pixmaps. The affected products include the X.Org and XFree86 X server applications, possibly among others.
An integer overflow condition may result in a memory allocation request returning an allocated region that is incorrectly sized. The client may then be able to use the XDrawPoint()
and XGetImage()
functions to read and write to arbitrary locations in the X serverβs address space.
A malicious local authenticated attacker may be able to execute arbitrary code with the privileges of the X server.
Apply an update
Contact your vendor for updates, fixes, and workarounds.
102441
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: September 07, 2005 Updated: September 19, 2005
Affected
The Debian distribution is vulnerable by this problem.
For the old stable distribution (woody) this problem has been fixed in
version 4.1.0-16woody7.
For the stable distribution (sarge) this problem has been fixed in
version 4.3.0.dfsg.1-14sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 6.8.2.dfsg.1-7 of X.Org.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: September 19, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the security advisories for Fedora Core 3 and Fedora Core 4.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23102441 Feedback>).
Updated: September 19, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Gentoo security advisory for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23102441 Feedback>).
Notified: September 07, 2005 Updated: September 19, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Mandriva security advisory for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23102441 Feedback>).
Notified: September 07, 2005 Updated: September 29, 2005
Affected
`Updated XFree86 packages (for Red Hat Enterprise Linux 2.1 and 3) and updated X.org packages (for Red Hat Enterprise Linux 4) to correct this issue are available at the URL below and by using the Red Hat Network
βup2dateβ tool.
[
http://rhn.redhat.com/errata/CAN-2005-2495.html`](<http://rhn.redhat.com/errata/CAN-2005-2495.html>)
The vendor has not provided us with any further information regarding this vulnerability.
Please see the RedHat security advisory for XFree86 and X.Org for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23102441 Feedback>).
Notified: September 07, 2005 Updated: September 26, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see SUSE-SA:2005:056 for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23102441 Feedback>).
Updated: September 26, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Slackware security advisory for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23102441 Feedback>).
Updated: September 19, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Trustix security advisory for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23102441 Feedback>).
Notified: September 07, 2005 Updated: September 19, 2005
Not Affected
Hitachi HI-UX/M and HI-UX/WE2 are NOT Vulnerable to this issue.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: September 07, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: September 07, 2005 Updated: November 03, 2005
Unknown
XFree86 has a patch available for this vulnerability at:
<ftp://ftp.xfree86.org/4.5.0/fixes/fix-01>
This patch is included in XFree86 development snapshots 4.5.99.12 and later. The patch was developed by Marc La France.
The vendor has not provided us with any further information regarding this vulnerability.
View all 42 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Luke Hutchison and SΓΈren Sandmann Pedersen for reporting this vulnerability.
This document was written by Ken MacInnis.
CVE IDs: | CVE-2005-2495 |
---|---|
Severity Metric: | 7.43 Date Public: |