freetype, libxfont, xorg, xorg-server vulnerabilities

Related Vulnerabilities: CVE-2007-1003   CVE-2007-1351   CVE-2007-1352  

Sean Larsson of iDefense Labs discovered that the MISC-XC extension of Xorg did not correctly verify the size of allocated memory. An authenticated user could send a specially crafted X11 request and execute arbitrary code with root privileges. (CVE-2007-1003)

Greg MacManus of iDefense Labs discovered that the BDF font handling code in Xorg and FreeType did not correctly verify the size of allocated memory. If a user were tricked into using a specially crafted font, a remote attacker could execute arbitrary code with root privileges. (CVE-2007-1351, CVE-2007-1352)

3 April 2007

freetype, libxfont, xorg, xorg-server vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 6.10
  • Ubuntu 6.06 LTS
  • Ubuntu 5.10

Software Description

Details

Sean Larsson of iDefense Labs discovered that the MISC-XC extension of Xorg did not correctly verify the size of allocated memory. An authenticated user could send a specially crafted X11 request and execute arbitrary code with root privileges. (CVE-2007-1003)

Greg MacManus of iDefense Labs discovered that the BDF font handling code in Xorg and FreeType did not correctly verify the size of allocated memory. If a user were tricked into using a specially crafted font, a remote attacker could execute arbitrary code with root privileges. (CVE-2007-1351, CVE-2007-1352)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.10
libfreetype6 - 2.2.1-5ubuntu0.1
libxfont1 - 1:1.2.0-0ubuntu3.1
xserver-xorg-core - 1:1.1.1-0ubuntu12.2
Ubuntu 6.06 LTS
libfreetype6 - 2.1.10-1ubuntu2.3
libxfont1 - 1:1.0.0-0ubuntu3.3
xserver-xorg-core - 1:1.0.2-0ubuntu10.6
Ubuntu 5.10
libfreetype6 - 2.1.7-2.4ubuntu1.3
libxfont1 - 1:0.99.0+cvs.20050909-1.3
xserver-xorg-core - 6.8.2-77.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

References