5.1
CVSSv2

CVE-2005-2495

Published: 15/09/2005 Updated: 19/10/2018
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in XFree86 prior to 4.3.0 allow user-assisted malicious users to execute arbitrary code via a crafted pixmap image.

Vulnerable Product Search on Vulmon Subscribe to Product

xfree86 project xfree86 3.3.6

xfree86 project xfree86 4.0.0

xfree86 project xfree86 4.0.1

xfree86 project xfree86 4.0.2

xfree86 project xfree86 4.2.0

xfree86 project xfree86 4.2.1

xfree86 project xfree86 4.0.3

xfree86 project xfree86 4.1.0

Vendor Advisories

A local privilege escalation vulnerability has been discovered in the pixmap allocation handling of the X server By allocating a huge pixmap, a local user could trigger an integer overflow that resulted in a memory allocation that was too small for the requested pixmap This resulted in a buffer overflow which could eventually be exploited to exec ...
Søren Sandmann discovered a bug in memory allocation for pixmap images, that can cause a crash of the X server or to execute arbitrary code The update for the old stable distribution (woody) also contains a different correction for multiple vulnerabilities in libXpm (DSA 607, CAN-2004-0914, Bug#309143), since the old fix contained a regression F ...
Synopsis XFree86 security update Type/Severity Security Advisory: Important Topic Updated XFree86 packages that fix several integer overflows, various bugs,and add ATI RN50/ES1000 support are now available for Red Hat EnterpriseLinux 3This update has been rated as having important security impact by the Re ...
Synopsis XFree86 security update Type/Severity Security Advisory: Important Topic Updated XFree86 packages that fix several integer overflows are nowavailable for Red Hat Enterprise Linux 21This update has been rated as having important security impact by the RedHat Security Response Team Descri ...
Synopsis xorg-x11 security update Type/Severity Security Advisory: Important Topic Updated Xorg packages that fix several integer overflows are now availablefor Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team Descripti ...

References

CWE-189http://www.redhat.com/support/errata/RHSA-2005-501.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200509-07.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2005:164http://www.novell.com/linux/security/advisories/2005_56_xserver.htmlhttp://www.kb.cert.org/vuls/id/102441http://support.avaya.com/elmodocs2/security/ASA-2005-218.pdfhttp://support.avaya.com/elmodocs2/security/ASA-2005-226.pdfhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1http://secunia.com/advisories/17044http://secunia.com/advisories/17258http://secunia.com/advisories/17278http://www.redhat.com/support/errata/RHSA-2005-329.htmlhttp://www.redhat.com/support/errata/RHSA-2005-396.htmlhttp://www.novell.com/linux/security/advisories/2005_23_sr.htmlhttp://secunia.com/advisories/17215ftp://patches.sgi.com/support/free/security/advisories/20060403-01-Uhttp://secunia.com/advisories/21318http://www.debian.org/security/2005/dsa-816http://www.securityfocus.com/advisories/9285http://www.securityfocus.com/advisories/9286http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1http://www.securityfocus.com/bid/14807http://www.osvdb.org/19352http://securitytracker.com/id?1014887http://secunia.com/advisories/16777http://secunia.com/advisories/16790ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txthttp://secunia.com/advisories/19624http://secunia.com/advisories/19796http://www.vupen.com/english/advisories/2006/3140http://marc.info/?l=bugtraq&m=112690609622266&w=2https://www.ubuntu.com/usn/usn-182-1/https://exchange.xforce.ibmcloud.com/vulnerabilities/22244https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044http://www.securityfocus.com/archive/1/442163/100/0/threadedhttp://www.securityfocus.com/archive/1/427045/100/0/threadedhttps://usn.ubuntu.com/182-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/102441