Vulnerability Note VU#667502
XFree86 vulnerable to buffer overflow via error in 'ReadFontAlias()' function
XFree86 contains a vulnerability in the parsing of the 'fonts.alias' file, which could be exploited by a local user to execute arbitrary code with elevated privileges.
XFree86 contains a flaw during the processing of the 'fonts.alias' file. XFree86 is an implementation of the X Window System. The 'fonts.alias' file is used to map new names to existing fonts and must be placed in any directory of the font-path. When reading user input from the file it stores the user supplied data for the font name in a fixed-length buffer. It fails to check the length of the user input, leading to a buffer overflow condition
A local authenticated user may craft a 'fonts.alias' file to exploit this buffer overflow vulnerability, leading to execution of arbitrary code with root privileges. The local user must have privileges to write to one of the directories in the font-path to exploit this vulnerability.
Upgrade or Patch
This issue is resolved in XFree86 22.214.171.124. Upgrade or apply patches as specified by your vendor.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Debian Linux||Affected||-||17 Aug 2004|
|IBM Corporation||Affected||-||07 Dec 2004|
|Immunix||Affected||-||07 Dec 2004|
|Mandriva, Inc.||Affected||23 Aug 2004||26 Aug 2004|
|Mandriva, Inc.||Affected||-||07 Dec 2004|
|Red Hat, Inc.||Affected||-||07 Dec 2004|
|SCO||Affected||-||07 Dec 2004|
|SGI||Affected||-||07 Dec 2004|
|Sun Microsystems, Inc.||Affected||-||26 Oct 2005|
|TurboLinux||Affected||-||07 Dec 2004|
|Apple Computer, Inc.||Unknown||-||07 Dec 2004|
|Berkeley Software Design, Inc.||Unknown||-||07 Dec 2004|
|Cray Inc.||Unknown||-||07 Dec 2004|
|eMC Corporation||Unknown||-||07 Dec 2004|
|Engarde||Unknown||-||07 Dec 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by Greg MacManus.
This document was written by Will Dormann.
- CVE IDs: CAN-2004-0084
- Date Public: 12 Feb 2004
- Date First Published: 07 Dec 2004
- Date Last Updated: 25 Oct 2005
- Severity Metric: 9.62
- Document Revision: 15
If you have feedback, comments, or additional information about this vulnerability, please send us email.