Multiple X Window System servers contain a pixmap memory allocation flaw that may allow local users to execute code with elevated privileges.
Multiple X Window System server applications share code that may contain a flaw in the memory allocation for large pixmaps. The affected products include the X.Org and XFree86 X server applications, possibly among others.
An integer overflow condition may result in a memory allocation request returning an allocated region that is incorrectly sized. The client may then be able to use the XDrawPoint() and XGetImage() functions to read and write to arbitrary locations in the X server's address space.
A malicious local authenticated attacker may be able to execute arbitrary code with the privileges of the X server.
Apply an update
Debian Linux Affected
Fedora Project Affected
Gentoo Linux Affected
Mandriva, Inc. Affected
Red Hat, Inc. Affected
SUSE Linux Affected
Slackware Linux Inc. Affected
Trustix Secure Linux Affected
Hitachi Not Affected
Apple Computer, Inc. Unknown
Cray Inc. Unknown
Engarde Secure Linux Unknown
F5 Networks, Inc. Unknown
FreeBSD, Inc. Unknown
Hewlett-Packard Company Unknown
IBM Corporation Unknown
IBM Corporation (zseries) Unknown
IBM eServer Unknown
Immunix Communications, Inc. Unknown
Ingrian Networks, Inc. Unknown
Juniper Networks, Inc. Unknown
Mandriva, Inc. Unknown
Microsoft Corporation Unknown
MontaVista Software, Inc. Unknown
NEC Corporation Unknown
Novell, Inc. Unknown
Openwall GNU/*/Linux Unknown
QNX, Software Systems, Inc. Unknown
Sequent Computer Systems, Inc. Unknown
Silicon Graphics, Inc. Unknown
Sony Corporation Unknown
Sun Microsystems, Inc. Unknown
The SCO Group (SCO Linux) Unknown
The SCO Group (SCO Unix) Unknown
Wind River Systems, Inc. Unknown
Thanks to Luke Hutchison and Søren Sandmann Pedersen for reporting this vulnerability.
This document was written by Ken MacInnis.
|Date First Published:||2005-09-13|
|Date Last Updated:||2005-11-03 14:41 UTC|