// For flags

CVE-2008-0006

Xorg / XFree86 PCF font parser buffer overflow

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.

Un desbordamiento del búfer en (1) X.Org Xserver versiones anteriores a 1.4.1, y (2) las bibliotecas libfont y libXfont en algunas plataformas, incluyendo Sun Solaris, permite a atacantes dependiendo del contexto ejecutar código arbitrario por medio de una fuente PCF con una diferencia considerable entre los últimos y primeros valores col en la tabla PCF_BDF_ENCODINGS.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-12-03 CVE Reserved
  • 2008-01-18 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (68)
URL Tag Source
http://bugs.gentoo.org/show_bug.cgi?id=204362 X_refsource_confirm
http://docs.info.apple.com/article.html?artnum=307562 X_refsource_confirm
http://jvn.jp/en/jp/JVN88935101/index.html Third Party Advisory
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-001043.html Third Party Advisory
http://secunia.com/advisories/28718 Third Party Advisory
http://secunia.com/advisories/28843 Third Party Advisory
http://secunia.com/advisories/28885 Third Party Advisory
http://secunia.com/advisories/28941 Third Party Advisory
http://secunia.com/advisories/29139 Third Party Advisory
http://secunia.com/advisories/29420 Third Party Advisory
http://secunia.com/advisories/29622 Third Party Advisory
http://secunia.com/advisories/29707 Third Party Advisory
http://secunia.com/advisories/30161 Third Party Advisory
http://secunia.com/advisories/32545 Third Party Advisory
http://securitytracker.com/id?1019232 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2008-038.htm X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2008-077.htm X_refsource_confirm
http://www.kb.cert.org/vuls/id/203220 Third Party Advisory
http://www.securityfocus.com/archive/1/487335/100/0/threaded Mailing List
http://www.securityfocus.com/bid/27352 Vdb Entry
http://www.vupen.com/english/advisories/2008/0179 Vdb Entry
http://www.vupen.com/english/advisories/2008/0184 Vdb Entry
http://www.vupen.com/english/advisories/2008/0497/references Vdb Entry
http://www.vupen.com/english/advisories/2008/0703 Vdb Entry
http://www.vupen.com/english/advisories/2008/0924/references Vdb Entry
http://www.vupen.com/english/advisories/2008/3000 Vdb Entry
http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX61&path=/200802/SECURITY/20080227/datafile112539&label=AIX%20X%20server%20multiple%20vulnerabilities X_refsource_confirm
https://exchange.xforce.ibmcloud.com/vulnerabilities/39767 Vdb Entry
https://issues.rpath.com/browse/RPL-2010 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10021 Signature
URL Date SRC
URL Date SRC
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321 2018-10-15
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html 2018-10-15
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00004.html 2018-10-15
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html 2018-10-15
http://secunia.com/advisories/28273 2018-10-15
http://secunia.com/advisories/28500 2018-10-15
http://secunia.com/advisories/28532 2018-10-15
http://secunia.com/advisories/28535 2018-10-15
http://secunia.com/advisories/28536 2018-10-15
http://secunia.com/advisories/28540 2018-10-15
http://secunia.com/advisories/28542 2018-10-15
http://secunia.com/advisories/28544 2018-10-15
http://secunia.com/advisories/28550 2018-10-15
http://secunia.com/advisories/28571 2018-10-15
http://secunia.com/advisories/28592 2018-10-15
http://secunia.com/advisories/28621 2018-10-15
http://security.gentoo.org/glsa/glsa-200801-09.xml 2018-10-15
http://security.gentoo.org/glsa/glsa-200804-05.xml 2018-10-15
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201230-1 2018-10-15
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml 2018-10-15
http://www.mandriva.com/security/advisories?name=MDVSA-2008:021 2018-10-15
http://www.mandriva.com/security/advisories?name=MDVSA-2008:022 2018-10-15
http://www.mandriva.com/security/advisories?name=MDVSA-2008:024 2018-10-15
http://www.openbsd.org/errata41.html#012_xorg 2018-10-15
http://www.openbsd.org/errata42.html#006_xorg 2018-10-15
http://www.redhat.com/support/errata/RHSA-2008-0029.html 2018-10-15
http://www.redhat.com/support/errata/RHSA-2008-0030.html 2018-10-15
http://www.redhat.com/support/errata/RHSA-2008-0064.html 2018-10-15
https://bugzilla.redhat.com/show_bug.cgi?id=428044 2008-01-17
https://usn.ubuntu.com/571-1 2018-10-15
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00641.html 2018-10-15
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00674.html 2018-10-15
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00704.html 2018-10-15
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00771.html 2018-10-15
https://access.redhat.com/security/cve/CVE-2008-0006 2008-01-17
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sun
Search vendor "Sun"
Solaris Libfont
Search vendor "Sun" for product "Solaris Libfont"
*-
Affected
Sun
Search vendor "Sun"
Solaris Libxfont
Search vendor "Sun" for product "Solaris Libxfont"
*-
Affected
X.org
Search vendor "X.org"
Xserver
Search vendor "X.org" for product "Xserver"
<= 1.4
Search vendor "X.org" for product "Xserver" and version " <= 1.4"
-
Affected