41 results (0.025 seconds)

CVSS: 6.9EPSS: 0%CPEs: 4EXPL: 0

Untrusted search path vulnerability in x11perfcomp in XFree86 x11perf before 1.5.4 allows local users to gain privileges via unspecified Trojan horse code in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en x11perfcomp en XFree86 X11perf antes de v1.5.4 permite a usuarios locales obtener privilegios a través de código troyano no especificado en el directorio de trabajo actual. • http://lists.freedesktop.org/archives/xorg-announce/2011-July/001715.html http://rhn.redhat.com/errata/RHSA-2013-0502.html http://www.securityfocus.com/bid/58082 https://bugzilla.redhat.com/show_bug.cgi?id=717672 https://exchange.xforce.ibmcloud.com/vulnerabilities/82241 https://access.redhat.com/security/cve/CVE-2011-2504 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVSS: 3.6EPSS: 0%CPEs: 7EXPL: 0

The ProcSetEventMask function in difs/events.c in the xfs font server for X.Org X11R6 through X11R6.6 and XFree86 before 3.3.3 calls the SendErrToClient function with a mask value instead of a pointer, which allows local users to cause a denial of service (memory corruption and crash) or obtain potentially sensitive information from memory via a SetEventMask request that triggers an invalid pointer dereference. La función ProcSetEventMask en DEFI/events.c en el servidor de fuentes xfs para X.Org X11R6.6 y X11R6 hasta XFree86 antes de 3.3.3 llama a la función SendErrToClient con un valor de máscara en lugar de un puntero, lo que permite a usuarios locales provocar una denegación de servicio (corrupción de memoria y caída) u obtener información sensible de la memoria a través de una solicitud SetEventMask que dispara una desreferencia de puntero no válido. • http://invisible-island.net/ansification/ansify-xfs-cve.html http://lists.freedesktop.org/archives/xorg-announce/2012-July/002040.html http://marc.info/?l=bugtraq&m=135765511704334&w=2 http://twitter.com/bsdaemon/status/228958599790071809 https://blogs.oracle.com/sunsecurity/entry/cve_2012_1699_denial_of https://bugzilla.redhat.com/show_bug.cgi?id=842841 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19369 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 2%CPEs: 2EXPL: 0

Array index error in the XFree86-Misc extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via a PassMessage request containing a large array index. Error de índice de Array en la extensión XFree86-Misc de X.Org Xserver versiones anteriores a 1.4.1 permite a atacantes locales o remotos dependientes del contexto ejecutar código de su elección mediante una petición PassMessage conteniendo un índice de array largo. • http://bugs.gentoo.org/show_bug.cgi?id=204362 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=646 http://lists.freedesktop.org/archives/xorg/2008-January/031918.html http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00004.html http://secunia.com/advisories/28273 http://secunia.com/advisories/28532 http://secunia.com/advisories/28535 http://secunia.com/advisories/28536 http://secunia.com/advisories/28539 http://secunia.com/advisories/28540 http:/ •

CVSS: 8.5EPSS: 5%CPEs: 45EXPL: 0

Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow. Desbordamiento de enteros en la función bdfReadCharacters en (1) X.Org libXfont before 20070403 y (2) freetype 2.3.2 y permite a usuarios remotos validados ejecutar código de su elección a través de fuentes manipuladas BDF, las cueles dan como resultado un desbordamiento de pila. • http://issues.foresightlinux.org/browse/FL-223 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html http://rhn.redhat.com/errata/RHSA-2007-0125.html http://secunia.com/advisories/24741 http://secunia.com/advisories/24745 http://secunia.com/advisories/ • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures. Desbordamiento de enteros en la función ProcDbeGetVisualInfo en la extensión DBE para el X.Org 6.8.2, 6.9.0, 7.0 y 7.1, y XFree86 X server, permite a usuarios locales la ejecución de código de su elección a través de una solicitud del protocolo X modificada, que dispara una corrupción de memoria durante el procesamiento de estructuras de datos sin especificar. • http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=464 http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html http://osvdb.org/32085 http://secunia.com/advisories/23633 http://secunia.com/advisories/23670 http://secunia.com/advisories/23684 http://secunia.com/advisories/23689 htt •