低危 x11 代码执行漏洞

CVE编号

CVE-2008-1377

利用情况

暂无

补丁情况

没有补丁

披露时间

2008-06-17
漏洞描述
(1)spro createcontext和(2)Record extension 中的SProcRecordRegisterClients函数,(3)x.org x11r7.3中x服务器1.4中的 Security extension中的SProcSecurityGenerateAuthorization函数允许与上下文相关的攻击者通过具有巧尽心思构建的长度值的请求指定要在堆上交换任意数量的字节,触发堆损坏,从而执行任意代码。 

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-...
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=721
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
http://rhn.redhat.com/errata/RHSA-2008-0502.html
http://rhn.redhat.com/errata/RHSA-2008-0504.html
http://rhn.redhat.com/errata/RHSA-2008-0512.html
http://secunia.com/advisories/30627
http://secunia.com/advisories/30628
http://secunia.com/advisories/30629
http://secunia.com/advisories/30630
http://secunia.com/advisories/30637
http://secunia.com/advisories/30659
http://secunia.com/advisories/30664
http://secunia.com/advisories/30666
http://secunia.com/advisories/30671
http://secunia.com/advisories/30715
http://secunia.com/advisories/30772
http://secunia.com/advisories/30809
http://secunia.com/advisories/30843
http://secunia.com/advisories/31025
http://secunia.com/advisories/31109
http://secunia.com/advisories/32099
http://secunia.com/advisories/32545
http://secunia.com/advisories/33937
http://security.gentoo.org/glsa/glsa-200806-07.xml
http://securitytracker.com/id?1020247
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
http://support.apple.com/kb/HT3438
http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
http://www.debian.org/security/2008/dsa-1595
http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
http://www.redhat.com/support/errata/RHSA-2008-0503.html
http://www.securityfocus.com/archive/1/493548/100/0/threaded
http://www.securityfocus.com/archive/1/493550/100/0/threaded
http://www.ubuntu.com/usn/usn-616-1
http://www.vupen.com/english/advisories/2008/1803
http://www.vupen.com/english/advisories/2008/1833
http://www.vupen.com/english/advisories/2008/1983/references
http://www.vupen.com/english/advisories/2008/3000
https://issues.rpath.com/browse/RPL-2607
https://issues.rpath.com/browse/RPL-2619
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 x x11 r7.3 -
运行在以下环境
系统 centos_5 xorg-x11-server-Xvfb * Up to
(excluding)
1.1.1-48.41.el5_2.1
运行在以下环境
系统 debian_10 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_11 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_12 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_4.0 xorg-server * Up to
(excluding)
2:1.1.1-21etch5
运行在以下环境
系统 debian_5.0 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2~lenny1
运行在以下环境
系统 opensuse_10.2 xorg-x11 * Up to
(excluding)
7.2-30.15
运行在以下环境
系统 opensuse_10.3 xorg-x11 * Up to
(excluding)
7.1-91.3
运行在以下环境
系统 oracle_5 oraclelinux-release * Up to
(excluding)
1.1.1-48.41.0.1.el5_2.1
运行在以下环境
系统 redhat_5 xorg-x11-server-Xdmx * Up to
(excluding)
0:1.1.1-48.41.el5_2.1
运行在以下环境
系统 suse_11 xorg-x11-Xvnc * Up to
(excluding)
7.4-27.19
阿里云评分
3.8
  • 攻击路径
    远程
  • 攻击复杂度
    N/A
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    没有补丁
  • 数据保密性
    N/A
  • 数据完整性
    传输被破坏
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-189 数值错误
阿里云安全产品覆盖情况