Multiple X Window System servers contain a pixmap memory allocation flaw that may allow local users to execute code with elevated privileges.
Multiple X Window System server applications share code that may contain a flaw in the memory allocation for large pixmaps. The affected products include the X.Org and XFree86 X server applications, possibly among others.
An integer overflow condition may result in a memory allocation request returning an allocated region that is incorrectly sized. The client may then be able to use the XDrawPoint() and XGetImage() functions to read and write to arbitrary locations in the X server's address space.
A malicious local authenticated attacker may be able to execute arbitrary code with the privileges of the X server.
Apply an update
Red Hat, Inc.
Slackware Linux Inc.
Trustix Secure Linux
Apple Computer, Inc.
EMC, Inc. (formerly Data General Corporation)
Engarde Secure Linux
F5 Networks, Inc.
IBM Corporation (zseries)
Immunix Communications, Inc.
Ingrian Networks, Inc.
Juniper Networks, Inc.
MontaVista Software, Inc.
QNX, Software Systems, Inc.
Sequent Computer Systems, Inc.
Silicon Graphics, Inc.
Sun Microsystems, Inc.
The SCO Group (SCO Linux)
The SCO Group (SCO Unix)
Wind River Systems, Inc.
xFree86 (distributor of free implementations of X)
Thanks to Luke Hutchison and Søren Sandmann Pedersen for reporting this vulnerability.
This document was written by Ken MacInnis.
|Date First Published:||2005-09-13|
|Date Last Updated:||2005-11-03 14:41 UTC|