Vulnerability Note VU#820006
XFree86 vulnerable to buffer overflow via crafted font directory in 'fonts.alias' file
XFree86 contains a vulnerability in the parsing of the 'fonts.alias' file, which could be exploited by a local user to execute arbitrary code with elevated privileges.
XFree86 contains a flaw during the processing of the 'fonts.alias' file. XFree86 is an implementation of the X Window System. The 'fonts.alias' file is used to map new names to existing fonts and must be placed in any directory of the font-path. When reading user input from the file it stores the user supplied data for the font directory in a fixed-length buffer. It fails to check the length of the user input, leading to a buffer overflow condition.
A local authenticated user may craft a 'fonts.alias' file to exploit this buffer overflow vulnerability, leading to execution of arbitrary code with root privileges. The local user must have privileges to write to one of the directories in the font-path to exploit this vulnerability.
Upgrade or Patch
This issue is resolved in XFree86 188.8.131.52. Upgrade or apply patches as specified by your vendor.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Gentoo||Affected||-||07 Dec 2004|
|IBM Corporation||Affected||-||07 Dec 2004|
|Mandriva, Inc.||Affected||-||07 Dec 2004|
|Mandriva, Inc.||Affected||23 Aug 2004||07 Dec 2004|
|Red Hat, Inc.||Affected||-||07 Dec 2004|
|SCO||Affected||-||07 Dec 2004|
|SGI||Affected||-||07 Dec 2004|
|Slackware||Affected||-||07 Dec 2004|
|Sun Microsystems, Inc.||Affected||-||26 Oct 2005|
|SUSE Linux||Affected||-||07 Dec 2004|
|TurboLinux||Affected||-||07 Dec 2004|
|Apple Computer, Inc.||Unknown||-||07 Dec 2004|
|Avaya||Unknown||-||06 Jun 2005|
|Berkeley Software Design, Inc.||Unknown||-||07 Dec 2004|
|Cray Inc.||Unknown||-||07 Dec 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by Greg MacManus.
This document was written by Will Dormann.
- CVE IDs: CAN-2004-0083
- Date Public: 10 Feb 2004
- Date First Published: 07 Dec 2004
- Date Last Updated: 26 Oct 2005
- Severity Metric: 9.62
- Document Revision: 24
If you have feedback, comments, or additional information about this vulnerability, please send us email.