CVE-2003-0730
https://notcve.org/view.php?id=CVE-2003-0730
Multiple integer overflows in the font libraries for XFree86 4.3.0 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-015.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20031101-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821 http://marc.info/?l=bugtraq&m=106229335312429&w=2 http://secunia.com/advisories/24168 http://secunia.com/advisories/24247 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1 http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm http:// •
CVE-2001-1409
https://notcve.org/view.php?id=CVE-2001-1409
dexconf in XFree86 Xserver 4.1.0-2 creates the /dev/dri directory with insecure permissions (666), which allows local users to replace or create files in the root file system. dexconf de XFree86 Xserver 4.1.0-2 crea el directorio /dev/dri con permisos inseguros (666), lo que permite a usuarios locales reemplazar o crear ficheros en el sistema de ficheros raíz. • http://groups.google.com/groups?selm=20010829121505.A16004%40compusol.com.au http://sunsolve.sun.com/search/document.do?assetkey=1-66-228529-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1017429.1-1 http://www.redhat.com/support/errata/RHSA-2003-067.html https://access.redhat.com/security/cve/CVE-2001-1409 https://bugzilla.redhat.com/show_bug.cgi?id=1616706 •
CVE-2003-0071
https://notcve.org/view.php?id=CVE-2003-0071
The DEC UDK processing feature in the xterm terminal emulator in XFree86 4.2.99.4 and earlier allows attackers to cause a denial of service via a certain character escape sequence that causes the terminal to enter a tight loop. La capacidad de procesamiento DEC UDK en el emulador de terminal xterm de XFree86 4.2.0 permite a atacantes causar una denegación de servicio mediante cierta secuencia de carácter de escape que hace que el terminal entre en un bucle cerrado. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.debian.org/security/2003/dsa-380 http://www.iss.net/security_center/static/11415.php http://www.redhat.com/support/errata/RHSA-2003-064.html http://www.redhat.com/support/errata/RHSA-2003-065.html http://www.redhat.com/support/errata/RHSA-2003-066.html http://www.redhat.com/support/errata/RHSA-2003-067.html http://www.securityfocus.com •
CVE-2003-0063
https://notcve.org/view.php?id=CVE-2003-0063
The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal xterm en XFree86 4.2.0 permite a atacantes modificar el título de la ventana mediante cierta secuencia de caracter de escape y a continuación insertarlo de vuelta en la linea de comando en el terminal del usuario, por ejemplo, cuando el usuario ve un fichero que contiene la secuencia maliciosa, lo que podría permitir ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.debian.org/security/2003/dsa-380 http://www.iss.net/security_center/static/11414.php http://www.openwall.com/lists/oss-security/2024/06/15/1 http://www.redhat.com/support/errata/RHSA-2003-064.html http://www.redhat.com/support/errata/RHSA-2003-065.html http://www.redhat.com/support/errata/RHSA-2003-066.html http://www.redhat.com •
CVE-2002-1472 – HP-UX LPD Command Execution
https://notcve.org/view.php?id=CVE-2002-1472
Untrusted search path vulnerability in libX11.so in xfree86, when used in setuid or setgid programs, allows local users to gain root privileges via a modified LD_PRELOAD environment variable that points to a malicious module. Vulnerabilidad de búsqueda en ruta no confiable en libX11.so en xfree86, cuando se usa en programas setuid o setid, permite a usuarios locales ganar privilegios de root mediante una variable de entorno LD_PRELOAD modificada que apunta a código malicioso. • http://archives.neohapsis.com/archives/linux/suse/2002-q3/1116.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000529 http://www.iss.net/security_center/static/10137.php http://www.osvdb.org/11922 http://www.redhat.com/support/errata/RHSA-2003-066.html http://www.redhat.com/support/errata/RHSA-2003-067.html http://www.securityfocus.com/bid/5735 https://access.redhat.com/security/cve/CVE-2002-1472 https://bugzilla.redhat.com/show_bug.cgi?id=1616917 •