CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
90.5%
Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.
Vendor | Product | Version | CPE |
---|---|---|---|
xfree86_project | xfree86 | 3.3.6 | cpe:2.3:a:xfree86_project:xfree86:3.3.6:*:*:*:*:*:*:* |
xfree86_project | xfree86 | 4.0.0 | cpe:2.3:a:xfree86_project:xfree86:4.0.0:*:*:*:*:*:*:* |
xfree86_project | xfree86 | 4.0.1 | cpe:2.3:a:xfree86_project:xfree86:4.0.1:*:*:*:*:*:*:* |
xfree86_project | xfree86 | 4.0.2 | cpe:2.3:a:xfree86_project:xfree86:4.0.2:*:*:*:*:*:*:* |
xfree86_project | xfree86 | 4.0.3 | cpe:2.3:a:xfree86_project:xfree86:4.0.3:*:*:*:*:*:*:* |
xfree86_project | xfree86 | 4.1.0 | cpe:2.3:a:xfree86_project:xfree86:4.1.0:*:*:*:*:*:*:* |
xfree86_project | xfree86 | 4.2.0 | cpe:2.3:a:xfree86_project:xfree86:4.2.0:*:*:*:*:*:*:* |
xfree86_project | xfree86 | 4.2.1 | cpe:2.3:a:xfree86_project:xfree86:4.2.1:*:*:*:*:*:*:* |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
marc.info/?l=bugtraq&m=112690609622266&w=2
secunia.com/advisories/16777
secunia.com/advisories/16790
secunia.com/advisories/17044
secunia.com/advisories/17215
secunia.com/advisories/17258
secunia.com/advisories/17278
secunia.com/advisories/19624
secunia.com/advisories/19796
secunia.com/advisories/21318
securitytracker.com/id?1014887
sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1
sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1
support.avaya.com/elmodocs2/security/ASA-2005-218.pdf
support.avaya.com/elmodocs2/security/ASA-2005-226.pdf
www.debian.org/security/2005/dsa-816
www.gentoo.org/security/en/glsa/glsa-200509-07.xml
www.kb.cert.org/vuls/id/102441
www.mandriva.com/security/advisories?name=MDKSA-2005:164
www.novell.com/linux/security/advisories/2005_23_sr.html
www.novell.com/linux/security/advisories/2005_56_xserver.html
www.osvdb.org/19352
www.redhat.com/support/errata/RHSA-2005-329.html
www.redhat.com/support/errata/RHSA-2005-396.html
www.redhat.com/support/errata/RHSA-2005-501.html
www.securityfocus.com/advisories/9285
www.securityfocus.com/advisories/9286
www.securityfocus.com/archive/1/427045/100/0/threaded
www.securityfocus.com/archive/1/442163/100/0/threaded
www.securityfocus.com/bid/14807
www.vupen.com/english/advisories/2006/3140
exchange.xforce.ibmcloud.com/vulnerabilities/22244
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998
www.ubuntu.com/usn/usn-182-1/