Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.1.2007.1294
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1294-1)
Summary:The remote host is missing an update for the Debian 'xfree86' package(s) announced via the DSA-1294-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'xfree86' package(s) announced via the DSA-1294-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the X Window System, which may lead to privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-1003

Sean Larsson discovered an integer overflow in the XC-MISC extension, which might lead to denial of service or local privilege escalation.

CVE-2007-1351

Greg MacManus discovered an integer overflow in the font handling, which might lead to denial of service or local privilege escalation.

CVE-2007-1352

Greg MacManus discovered an integer overflow in the font handling, which might lead to denial of service or local privilege escalation.

CVE-2007-1667

Sami Leides discovered an integer overflow in the libx11 library which might lead to the execution of arbitrary code. This update introduces tighter sanity checking of input passed to XCreateImage(). To cope with this an updated rdesktop package is delivered along with this security update. Another application reported to break is the proprietary Opera browser, which isn't part of Debian. The vendor has released updated packages, though.

For the old stable distribution (sarge) these problems have been fixed in version 4.3.0.dfsg.1-14sarge4. This update lacks builds for the Sparc architecture, due to problems on the build host. Packages will be released once this problem has been resolved.

The stable distribution (etch) isn't affected by these problems, as the vulnerabilities have already been fixed during the Etch preparation freeze phase.

We recommend that you upgrade your XFree86 packages.

Affected Software/OS:
'xfree86' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1003
1017857
http://www.securitytracker.com/id?1017857
102886
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
20070403 Multiple Vendor X Server XC-MISC Extension Memory Corruption Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=503
20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs
http://www.securityfocus.com/archive/1/464686/100/0/threaded
20070405 FLEA-2007-0009-1: xorg-x11 freetype
http://www.securityfocus.com/archive/1/464816/100/0/threaded
23284
http://www.securityfocus.com/bid/23284
23300
http://www.securityfocus.com/bid/23300
24741
http://secunia.com/advisories/24741
24745
http://secunia.com/advisories/24745
24756
http://secunia.com/advisories/24756
24758
http://secunia.com/advisories/24758
24765
http://secunia.com/advisories/24765
24770
http://secunia.com/advisories/24770
24771
http://secunia.com/advisories/24771
24772
http://secunia.com/advisories/24772
24791
http://secunia.com/advisories/24791
25004
http://secunia.com/advisories/25004
25006
http://secunia.com/advisories/25006
25195
http://secunia.com/advisories/25195
25216
http://secunia.com/advisories/25216
25305
http://secunia.com/advisories/25305
29622
http://secunia.com/advisories/29622
ADV-2007-1217
http://www.vupen.com/english/advisories/2007/1217
ADV-2007-1548
http://www.vupen.com/english/advisories/2007/1548
DSA-1294
http://www.debian.org/security/2007/dsa-1294
GLSA-200705-10
http://security.gentoo.org/glsa/glsa-200705-10.xml
MDKSA-2007:079
http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
MDKSA-2007:080
http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
RHSA-2007:0125
http://rhn.redhat.com/errata/RHSA-2007-0125.html
RHSA-2007:0126
http://www.redhat.com/support/errata/RHSA-2007-0126.html
RHSA-2007:0127
http://www.redhat.com/support/errata/RHSA-2007-0127.html
SUSE-SA:2007:027
http://www.novell.com/linux/security/advisories/2007_27_x.html
SUSE-SR:2008:008
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
USN-448-1
http://www.ubuntu.com/usn/usn-448-1
[3.9] 021: SECURITY FIX: April 4, 2007
http://www.openbsd.org/errata39.html#021_xorg
[4.0] 011: SECURITY FIX: April 4, 2007
http://www.openbsd.org/errata40.html#011_xorg
[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont
http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
http://issues.foresightlinux.org/browse/FL-223
http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
https://issues.rpath.com/browse/RPL-1213
oval:org.mitre.oval:def:1980
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1980
oval:org.mitre.oval:def:9798
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9798
xorg-xcmisc-overflow(33424)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33424
Common Vulnerability Exposure (CVE) ID: CVE-2007-1351
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
BugTraq ID: 23283
http://www.securityfocus.com/bid/23283
BugTraq ID: 23300
BugTraq ID: 23402
http://www.securityfocus.com/bid/23402
Bugtraq: 20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs (Google Search)
Bugtraq: 20070405 FLEA-2007-0009-1: xorg-x11 freetype (Google Search)
Debian Security Information: DSA-1294 (Google Search)
Debian Security Information: DSA-1454 (Google Search)
http://www.debian.org/security/2008/dsa-1454
http://security.gentoo.org/glsa/glsa-200705-02.xml
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
http://www.mandriva.com/security/advisories?name=MDKSA-2007:081
OpenBSD Security Advisory: [3.9] 021: SECURITY FIX: April 4, 2007
OpenBSD Security Advisory: [4.0] 011: SECURITY FIX: April 4, 2007
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810
RedHat Security Advisories: RHSA-2007:0125
http://www.redhat.com/support/errata/RHSA-2007-0132.html
http://www.redhat.com/support/errata/RHSA-2007-0150.html
http://secunia.com/advisories/24768
http://secunia.com/advisories/24776
http://secunia.com/advisories/24885
http://secunia.com/advisories/24889
http://secunia.com/advisories/24921
http://secunia.com/advisories/24996
http://secunia.com/advisories/25096
http://secunia.com/advisories/25495
http://secunia.com/advisories/28333
http://secunia.com/advisories/30161
http://secunia.com/advisories/33937
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
SuSE Security Announcement: SUSE-SA:2007:027 (Google Search)
SuSE Security Announcement: SUSE-SR:2007:006 (Google Search)
http://www.novell.com/linux/security/advisories/2007_6_sr.html
http://www.trustix.org/errata/2007/0013/
http://www.vupen.com/english/advisories/2007/1264
XForce ISS Database: xorg-bdf-font-bo(33417)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33417
Common Vulnerability Exposure (CVE) ID: CVE-2007-1352
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
XForce ISS Database: xorg-fontsdir-bo(33419)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
Common Vulnerability Exposure (CVE) ID: CVE-2007-1667
Debian Security Information: DSA-1858 (Google Search)
http://www.debian.org/security/2009/dsa-1858
http://security.gentoo.org/glsa/glsa-200705-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:147
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776
http://www.redhat.com/support/errata/RHSA-2007-0157.html
http://www.securitytracker.com/id?1017864
http://secunia.com/advisories/24739
http://secunia.com/advisories/24953
http://secunia.com/advisories/24975
http://secunia.com/advisories/25072
http://secunia.com/advisories/25112
http://secunia.com/advisories/25131
http://secunia.com/advisories/25992
http://secunia.com/advisories/26177
http://secunia.com/advisories/36260
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1
SuSE Security Announcement: SUSE-SR:2007:008 (Google Search)
http://www.novell.com/linux/security/advisories/2007_8_sr.html
http://www.ubuntu.com/usn/usn-453-1
http://www.ubuntu.com/usn/usn-453-2
http://www.ubuntu.com/usn/usn-481-1
http://www.vupen.com/english/advisories/2007/1531
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.