XFree86 contains a vulnerability in the parsing of the 'fonts.alias' file, which could be exploited by a local user to execute arbitrary code with elevated privileges.
XFree86 contains a flaw during the processing of the 'fonts.alias' file. XFree86 is an implementation of the X Window System. The 'fonts.alias' file is used to map new names to existing fonts and must be placed in any directory of the font-path. When reading user input from the file it stores the user supplied data for the font name in a fixed-length buffer. It fails to check the length of the user input, leading to a buffer overflow condition
A local authenticated user may craft a 'fonts.alias' file to exploit this buffer overflow vulnerability, leading to execution of arbitrary code with root privileges. The local user must have privileges to write to one of the directories in the font-path to exploit this vulnerability.
Upgrade or Patch
This issue is resolved in XFree86 184.108.40.206. Upgrade or apply patches as specified by your vendor.
Red Hat, Inc.
Sun Microsystems, Inc.
Apple Computer, Inc.
Berkeley Software Design, Inc.
Ingrian Networks, Inc.
Juniper Networks, Inc.
MontaVista Software, Inc.
Sequent Computer Systems, Inc.
Wind River Systems, Inc.
This vulnerability was reported by Greg MacManus.
This document was written by Will Dormann.
|Date First Published:||2004-12-07|
|Date Last Updated:||2005-10-25 15:08 UTC|