CVE-2008-1377
X.org Record and Security extensions memory corruption
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
Las funciones (1) SProcRecordCreateContext y (2) SProcRecordRegisterClients en la extensión Record y la función (3) SProcSecurityGenerateAuthorization en la extensión Security del servidor X 1.4 en X.Org X11R7.3 permite a atacantes dependientes de contexto ejecutar código de su elección a través de peticiones con longitud de valores manipuladas que especifica un número aleatorio de bytes a ser intercambiados en el montículo, lo cual dispara corrupción de montículo.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-03-18 CVE Reserved
- 2008-06-11 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-189: Numeric Errors
CAPEC
References (51)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html | 2018-10-11 | |
http://rhn.redhat.com/errata/RHSA-2008-0502.html | 2018-10-11 | |
http://www.debian.org/security/2008/dsa-1595 | 2018-10-11 | |
http://www.ubuntu.com/usn/usn-616-1 | 2018-10-11 |