CVE-2007-4730
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
11/09/2007
Last modified:
09/04/2025
Description
Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:x.org:xorg-server:1.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x.org:xorg-server:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x.org:xorg-server:1.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x.org:xorg-server:1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x.org:xorg-server:1.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.freedesktop.org/show_bug.cgi?id=7447
- http://bugs.gentoo.org/show_bug.cgi?id=191964
- http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html
- http://osvdb.org/37726
- http://secunia.com/advisories/26743
- http://secunia.com/advisories/26755
- http://secunia.com/advisories/26763
- http://secunia.com/advisories/26823
- http://secunia.com/advisories/26859
- http://secunia.com/advisories/26897
- http://secunia.com/advisories/27147
- http://secunia.com/advisories/27179
- http://secunia.com/advisories/27228
- http://secunia.com/advisories/30161
- http://security.gentoo.org/glsa/glsa-200710-16.xml
- http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm
- http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187
- http://www.debian.org/security/2007/dsa-1372
- http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A178
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A022
- http://www.novell.com/linux/security/advisories/2007_54_xorg.html
- http://www.redhat.com/support/errata/RHSA-2007-0898.html
- http://www.securityfocus.com/bid/25606
- http://www.securitytracker.com/id?1018665=
- http://www.ubuntu.com/usn/usn-514-1
- http://www.vupen.com/english/advisories/2007/3098
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36535
- https://issues.rpath.com/browse/RPL-1728
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430
- http://bugs.freedesktop.org/show_bug.cgi?id=7447
- http://bugs.gentoo.org/show_bug.cgi?id=191964
- http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html
- http://osvdb.org/37726
- http://secunia.com/advisories/26743
- http://secunia.com/advisories/26755
- http://secunia.com/advisories/26763
- http://secunia.com/advisories/26823
- http://secunia.com/advisories/26859
- http://secunia.com/advisories/26897
- http://secunia.com/advisories/27147
- http://secunia.com/advisories/27179
- http://secunia.com/advisories/27228
- http://secunia.com/advisories/30161
- http://security.gentoo.org/glsa/glsa-200710-16.xml
- http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm
- http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187
- http://www.debian.org/security/2007/dsa-1372
- http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A178
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A022
- http://www.novell.com/linux/security/advisories/2007_54_xorg.html
- http://www.redhat.com/support/errata/RHSA-2007-0898.html
- http://www.securityfocus.com/bid/25606
- http://www.securitytracker.com/id?1018665=
- http://www.ubuntu.com/usn/usn-514-1
- http://www.vupen.com/english/advisories/2007/3098
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36535
- https://issues.rpath.com/browse/RPL-1728
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430



