// For flags

CVE-2007-1003

xserver XC-MISC integer overflow

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.

Desbordamiento de búfer en ALLOCATE_LOCAL en la función ProcXCMiscGetXIDList en la extensión XC-MISC en el servidor X.Org X11 (xserver) 7.1-1.1.0, y otras versiones anteriores anterior a 20070403, permite a usuarios validados validados ejecutar código de su elección a través de expresiones largas, las cuales desembocan en una corrupción de memoria.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-02-16 CVE Reserved
  • 2007-04-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (45)
URL Tag Source
http://issues.foresightlinux.org/browse/FL-223 X_refsource_confirm
http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html Mailing List
http://secunia.com/advisories/24745 Third Party Advisory
http://secunia.com/advisories/24758 Third Party Advisory
http://secunia.com/advisories/24765 Third Party Advisory
http://secunia.com/advisories/24771 Third Party Advisory
http://secunia.com/advisories/24772 Third Party Advisory
http://secunia.com/advisories/24791 Third Party Advisory
http://secunia.com/advisories/25004 Third Party Advisory
http://secunia.com/advisories/25006 Third Party Advisory
http://secunia.com/advisories/25195 Third Party Advisory
http://secunia.com/advisories/25216 Third Party Advisory
http://secunia.com/advisories/25305 Third Party Advisory
http://secunia.com/advisories/29622 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm X_refsource_confirm
http://www.securityfocus.com/archive/1/464686/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/464816/100/0/threaded Mailing List
http://www.securityfocus.com/bid/23300 Vdb Entry
http://www.securitytracker.com/id?1017857 Vdb Entry
http://www.vupen.com/english/advisories/2007/1217 Vdb Entry
http://www.vupen.com/english/advisories/2007/1548 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/33424 Vdb Entry
https://issues.rpath.com/browse/RPL-1213 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
X.org
Search vendor "X.org"
X11
Search vendor "X.org" for product "X11"
7.1_1.1.0
Search vendor "X.org" for product "X11" and version "7.1_1.1.0"
-
Affected