
CVE-2017-13720 – Debian Security Advisory 3995-1
https://notcve.org/view.php?id=CVE-2017-13720
10 Oct 2017 — In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters. En la función PatternMatch en fontfile/fontdir.c en libXfont, en versiones hasta la 1.5.2 y versiones 2.x hasta la 2.0.2, un atacante con acces... • http://www.debian.org/security/2017/dsa-3995 • CWE-125: Out-of-bounds Read •

CVE-2017-13722 – Debian Security Advisory 3995-1
https://notcve.org/view.php?id=CVE-2017-13722
10 Oct 2017 — In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server. En la función pcfGetProperties en bitmap/pcfread.c en libXfont, en versiones hasta la 1.5.2 y versiones 2.x hasta la 2.0.2, atacantes autenticados en un servidor X podrían utilizar la falta de una comprobación de límites (para arc... • http://www.debian.org/security/2017/dsa-3995 • CWE-125: Out-of-bounds Read •

CVE-2017-13723 – Gentoo Linux Security Advisory 201710-30
https://notcve.org/view.php?id=CVE-2017-13723
05 Oct 2017 — In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp. En versiones anteriores a la 1.19.4 de X.Org Server (también llamado xserver y xorg-server) un atacante autenticado en el servidor X podría provocar un desbordamiento de búfer global, causando cierres inesperados del servidor X ... • http://www.debian.org/security/2017/dsa-4000 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-13721 – Gentoo Linux Security Advisory 201710-30
https://notcve.org/view.php?id=CVE-2017-13721
05 Oct 2017 — In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session. En versiones anteriores a la 1.19.4 de X.Org Server (también llamado xserver y xorg-server) un atacante autenticado en un servidor X con la extensión de memoria compartida X habilitada puede provocar cancelaciones del servidor X o reemplazar segmentos de memor... • http://www.debian.org/security/2017/dsa-4000 • CWE-269: Improper Privilege Management •

CVE-2017-10971 – Debian Security Advisory 3905-1
https://notcve.org/view.php?id=CVE-2017-10971
06 Jul 2017 — In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. En el servidor X de X.Org antes del 19-06-2017, un usuario autenticado en una Sesión X podría bloquear o ejecutar código en el contexto del servidor X al explotar un desbordamiento de pila en la conversión endianness de Eventos X. It was discovered that the X.Org X server incorrectly handled endiannes... • http://www.debian.org/security/2017/dsa-3905 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-10972 – Debian Security Advisory 3905-1
https://notcve.org/view.php?id=CVE-2017-10972
06 Jul 2017 — Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server. Datos no inicializados en la conversión endianness en el manejo de XEvent del servidor X de X.Org antes del 19-06-2017, permitieron a usuarios maliciosos autenticados potencialmente acceder a datos privilegiados del servidor X. It was discovered that the X.Org X server incorrectly handled endianness conversio... • http://www.debian.org/security/2017/dsa-3905 • CWE-665: Improper Initialization •

CVE-2017-2625 – libXdmcp: weak entropy usage for session keys
https://notcve.org/view.php?id=CVE-2017-2625
01 Mar 2017 — It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions. Se ha descubierto que libXdmcp en versiones anteriores a la 1.1.2 usaba entropía débil para generar claves de sesión. En un sistema multiusuario que utilice xdmcp, un atacante local podría utilizar la información disponible... • https://packetstorm.news/files/id/141367 • CWE-320: Key Management Errors CWE-331: Insufficient Entropy •

CVE-2017-2624 – Gentoo Linux Security Advisory 201710-30
https://notcve.org/view.php?id=CVE-2017-2624
01 Mar 2017 — It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack. Se ha encontrado que xorg-x11-server en versiones anteriores a la 1.19.0 que uttilizan memcmp() para comprobar l... • https://packetstorm.news/files/id/141367 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-385: Covert Timing Channel •

CVE-2016-10164 – libXpm: Out-of-bounds write in XPM extension parsing
https://notcve.org/view.php?id=CVE-2016-10164
30 Jan 2017 — Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow. Desbordamientos múltiples de entero en libXpm en versiones anteriores a 3.5.12, cuando un programa solicita interpretar extensiones XPM en una plataforma 64-... • http://www.debian.org/security/2017/dsa-3772 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2015-3418 – Gentoo Linux Security Advisory 201701-64
https://notcve.org/view.php?id=CVE-2015-3418
13 Dec 2016 — The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. La función ProcPutImage en dix/dispatch.c en X.Org Server (también conocido como xserver y xorg-server) en versiones anteriores a 1.16.4 permite a atacantes provocar una denegación de servicio (división por cero y caída) a través de una solicitud PutImage de altura cero. Multiple vulnerabilities ha... • http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html • CWE-369: Divide By Zero •