// For flags

CVE-2008-2361

X.org Render extension ProcRenderCreateCursor() crash

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.

Desbordamiento de entero en la función ProcRenderCreateCursor de la extensión Render del X server 1.4 en X.Org X11R7.3; permite a atacantes dependientes del contexto provocar una denegación de servicio (caída del demonio) a través de campos de solicitud no determinados que se utilizan para calcular un tamaño del búfer glyph, esto produce un referencia a una memoria sin mapear.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-05-21 CVE Reserved
  • 2008-06-11 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (48)
URL Tag Source
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719 Third Party Advisory
http://lists.freedesktop.org/archives/xorg/2008-June/036026.html Mailing List
http://secunia.com/advisories/30671 Third Party Advisory
http://secunia.com/advisories/30715 Third Party Advisory
http://secunia.com/advisories/30772 Third Party Advisory
http://secunia.com/advisories/30809 Third Party Advisory
http://secunia.com/advisories/30843 Third Party Advisory
http://secunia.com/advisories/31025 Third Party Advisory
http://secunia.com/advisories/31109 Third Party Advisory
http://secunia.com/advisories/32099 Third Party Advisory
http://secunia.com/advisories/33937 Third Party Advisory
http://securitytracker.com/id?1020244 Vdb Entry
http://support.apple.com/kb/HT3438 X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 X_refsource_confirm
http://www.securityfocus.com/archive/1/493548/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/493550/100/0/threaded Mailing List
http://www.vupen.com/english/advisories/2008/1803 Vdb Entry
http://www.vupen.com/english/advisories/2008/1833 Vdb Entry
http://www.vupen.com/english/advisories/2008/1983/references Vdb Entry
https://issues.rpath.com/browse/RPL-2607 X_refsource_confirm
https://issues.rpath.com/browse/RPL-2619 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xorg
Search vendor "Xorg"
X11
Search vendor "Xorg" for product "X11"
r7.3
Search vendor "Xorg" for product "X11" and version "r7.3"
-
Affected