6.8
CVSSv2

CVE-2008-2361

Published: 16/06/2008 Updated: 11/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Summary

Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent malicious users to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.

Vulnerable Product Search on Vulmon Subscribe to Product

xorg x11 r7.3

Vendor Advisories

Multiple flaws were found in the RENDER, RECORD, and Security extensions of Xorg which did not correctly validate function arguments An authenticated attacker could send specially crafted requests and gain root privileges or crash X (CVE-2008-1377, CVE-2008-2360, CVE-2008-2361, CVE-2008-2362) ...
Several local vulnerabilities have been discovered in the X Window system The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1377 Lack of validation of the parameters of the SProcSecurityGenerateAuthorization and SProcRecordCreateContext functions makes it possible for a specially crafted requ ...

References

CWE-189http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719http://lists.freedesktop.org/archives/xorg/2008-June/036026.htmlftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diffhttp://www.debian.org/security/2008/dsa-1595http://rhn.redhat.com/errata/RHSA-2008-0502.htmlhttp://rhn.redhat.com/errata/RHSA-2008-0504.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.htmlhttp://www.ubuntu.com/usn/usn-616-1http://www.securityfocus.com/bid/29665http://securitytracker.com/id?1020244http://secunia.com/advisories/30627http://secunia.com/advisories/30629http://secunia.com/advisories/30630http://secunia.com/advisories/30637http://secunia.com/advisories/30659http://secunia.com/advisories/30664http://secunia.com/advisories/30666http://support.avaya.com/elmodocs2/security/ASA-2008-249.htmhttp://www.redhat.com/support/errata/RHSA-2008-0503.htmlhttps://issues.rpath.com/browse/RPL-2619http://secunia.com/advisories/30715https://issues.rpath.com/browse/RPL-2607http://secunia.com/advisories/30843http://www.mandriva.com/security/advisories?name=MDVSA-2008:116http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201http://secunia.com/advisories/31109http://www.mandriva.com/security/advisories?name=MDVSA-2008:115http://secunia.com/advisories/30671http://secunia.com/advisories/30772http://security.gentoo.org/glsa/glsa-200806-07.xmlhttp://secunia.com/advisories/30809http://secunia.com/advisories/32099http://www.mandriva.com/security/advisories?name=MDVSA-2008:179http://secunia.com/advisories/31025http://www.gentoo.org/security/en/glsa/glsa-200807-07.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.htmlhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2008/1803http://www.vupen.com/english/advisories/2008/1833http://www.vupen.com/english/advisories/2008/1983/referenceshttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978http://www.securityfocus.com/archive/1/493550/100/0/threadedhttp://www.securityfocus.com/archive/1/493548/100/0/threadedhttps://usn.ubuntu.com/616-1/https://nvd.nist.gov