Vulnerabilidad en Ejecución de código arbitrario en X Font Server (xfs) a través de la función swap_char2b (CVE-2007-4990)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-189
Errores numéricos
Fecha de publicación:
05/10/2007
Última modificación:
09/04/2025
Descripción
La función swap_char2b de X.Org X Font Server (xfs) anterior a 1.0.5 permite a atacantes locales o remotos (dependiendo del contexto) ejecutar código de su elección mediante peticiones de protocolo (1) QueryXBitmaps y (2) QueryXExtents con valores de tamaño manipulados que especifican un número arbitrario de bytes para ser intercambiados en el montículo, lo que produce una corrupción del montículo.
Impacto
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:x.org:x_font_server:*:*:*:*:*:*:*:* | 1.0.4 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.freedesktop.org/show_bug.cgi?id=12299
- http://bugs.gentoo.org/show_bug.cgi?id=194606
- http://docs.info.apple.com/article.html?artnum=307562
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=602
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html
- http://secunia.com/advisories/27040
- http://secunia.com/advisories/27052
- http://secunia.com/advisories/27060
- http://secunia.com/advisories/27176
- http://secunia.com/advisories/27228
- http://secunia.com/advisories/27240
- http://secunia.com/advisories/27560
- http://secunia.com/advisories/28004
- http://secunia.com/advisories/28514
- http://secunia.com/advisories/28536
- http://secunia.com/advisories/28542
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200710-11.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103114-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200642-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A210
- http://www.novell.com/linux/security/advisories/2007_54_xorg.html
- http://www.redhat.com/support/errata/RHSA-2008-0029.html
- http://www.redhat.com/support/errata/RHSA-2008-0030.html
- http://www.securityfocus.com/archive/1/481432/100/0/threaded
- http://www.securityfocus.com/bid/25898
- http://www.securitytracker.com/id?1018763=
- http://www.vupen.com/english/advisories/2007/3337
- http://www.vupen.com/english/advisories/2007/3338
- http://www.vupen.com/english/advisories/2007/3467
- http://www.vupen.com/english/advisories/2008/0149
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36920
- https://issues.rpath.com/browse/RPL-1756
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11599
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00352.html
- http://bugs.freedesktop.org/show_bug.cgi?id=12299
- http://bugs.gentoo.org/show_bug.cgi?id=194606
- http://docs.info.apple.com/article.html?artnum=307562
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01323725
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=602
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html
- http://secunia.com/advisories/27040
- http://secunia.com/advisories/27052
- http://secunia.com/advisories/27060
- http://secunia.com/advisories/27176
- http://secunia.com/advisories/27228
- http://secunia.com/advisories/27240
- http://secunia.com/advisories/27560
- http://secunia.com/advisories/28004
- http://secunia.com/advisories/28514
- http://secunia.com/advisories/28536
- http://secunia.com/advisories/28542
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200710-11.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103114-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200642-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A210
- http://www.novell.com/linux/security/advisories/2007_54_xorg.html
- http://www.redhat.com/support/errata/RHSA-2008-0029.html
- http://www.redhat.com/support/errata/RHSA-2008-0030.html
- http://www.securityfocus.com/archive/1/481432/100/0/threaded
- http://www.securityfocus.com/bid/25898
- http://www.securitytracker.com/id?1018763=
- http://www.vupen.com/english/advisories/2007/3337
- http://www.vupen.com/english/advisories/2007/3338
- http://www.vupen.com/english/advisories/2007/3467
- http://www.vupen.com/english/advisories/2008/0149
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36920
- https://issues.rpath.com/browse/RPL-1756
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11599
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00352.html



