Rapid7 Vulnerability & Exploit Database

CESA-2004:478: XFree86 security update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

CESA-2004:478: XFree86 security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
08/18/2004
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated XFree86 packages that fix several security flaws in libXpm, as well as other bugs, are now available for CentOS Linux 3.

XFree86 is an open source implementation of the X Window System. It provides the basic low level functionality which full fledged graphical user interfaces (GUIs) such as GNOME and KDE are designed upon. During a source code audit, Chris Evans discovered several stack overflow flaws and an integer overflow flaw in the X.Org libXpm library used to decode XPM (X PixMap) images. An attacker could create a carefully crafted XPM file which would cause an application to crash or potentially execute arbitrary code if opened by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0687, CAN-2004-0688, and CAN-2004-0692 to these issues. A flaw was found in the X Display Manager (XDM). XDM is shipped with Red Hat Enterprise Linux, but is not used by default. XDM opened a chooserFd TCP socket even if the DisplayManager.requestPort parameter was set to 0. This allowed authorized users to access a machine remotely via X, even if the administrator had configured XDM to refuse such connections. Although XFree86 4.3.0 was not vulnerable to this issue, CentOS Linux 3 contained a backported patch which introduced this flaw. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0419 to this issue. Users are advised to upgrade to these erratum packages, which contain backported security patches to correct these and a number of other issues.

Solution(s)

  • centos-upgrade-xfree86
  • centos-upgrade-xfree86-100dpi-fonts
  • centos-upgrade-xfree86-75dpi-fonts
  • centos-upgrade-xfree86-base-fonts
  • centos-upgrade-xfree86-cyrillic-fonts
  • centos-upgrade-xfree86-devel
  • centos-upgrade-xfree86-doc
  • centos-upgrade-xfree86-font-utils
  • centos-upgrade-xfree86-iso8859-14-100dpi-fonts
  • centos-upgrade-xfree86-iso8859-14-75dpi-fonts
  • centos-upgrade-xfree86-iso8859-15-100dpi-fonts
  • centos-upgrade-xfree86-iso8859-15-75dpi-fonts
  • centos-upgrade-xfree86-iso8859-2-100dpi-fonts
  • centos-upgrade-xfree86-iso8859-2-75dpi-fonts
  • centos-upgrade-xfree86-iso8859-9-100dpi-fonts
  • centos-upgrade-xfree86-iso8859-9-75dpi-fonts
  • centos-upgrade-xfree86-libs
  • centos-upgrade-xfree86-libs-data
  • centos-upgrade-xfree86-mesa-libgl
  • centos-upgrade-xfree86-mesa-libglu
  • centos-upgrade-xfree86-sdk
  • centos-upgrade-xfree86-syriac-fonts
  • centos-upgrade-xfree86-tools
  • centos-upgrade-xfree86-truetype-fonts
  • centos-upgrade-xfree86-twm
  • centos-upgrade-xfree86-xauth
  • centos-upgrade-xfree86-xdm
  • centos-upgrade-xfree86-xfs
  • centos-upgrade-xfree86-xnest
  • centos-upgrade-xfree86-xvfb

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;