中危 X.Org X server MIT-SHM扩展信息泄露漏洞

CVE编号

CVE-2008-1379

利用情况

EXP 已公开

补丁情况

官方补丁

披露时间

2008-06-17
该漏洞EXP已公开传播,漏洞利用成本极低,建议您立即关注并修复。
漏洞描述
Xorg X Server是多个厂商操作系统中所捆绑的X窗口系统显示服务器。
X.Org X server的MIT-SHM扩展的fbShmPutImage()函数在创建位图时存在信息泄露漏洞。位图的宽度和高度是受用户控制的,而该函数没有验证位图处于共享的内存部分边界中,允许攻击者读取X服务进程的任意内存区域。如果将X服务器配置为监听基于TCP的客户端连接,且允许客户端通过xhosts文件创建会话,就可以远程利用这个漏洞。

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-...
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01543321
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
http://rhn.redhat.com/errata/RHSA-2008-0502.html
http://rhn.redhat.com/errata/RHSA-2008-0504.html
http://rhn.redhat.com/errata/RHSA-2008-0512.html
http://secunia.com/advisories/30627
http://secunia.com/advisories/30628
http://secunia.com/advisories/30629
http://secunia.com/advisories/30630
http://secunia.com/advisories/30637
http://secunia.com/advisories/30659
http://secunia.com/advisories/30664
http://secunia.com/advisories/30666
http://secunia.com/advisories/30671
http://secunia.com/advisories/30715
http://secunia.com/advisories/30772
http://secunia.com/advisories/30809
http://secunia.com/advisories/30843
http://secunia.com/advisories/31025
http://secunia.com/advisories/31109
http://secunia.com/advisories/32099
http://secunia.com/advisories/32545
http://secunia.com/advisories/33937
http://security.gentoo.org/glsa/glsa-200806-07.xml
http://securitytracker.com/id?1020246
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
http://support.apple.com/kb/HT3438
http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
http://www.debian.org/security/2008/dsa-1595
http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
http://www.redhat.com/support/errata/RHSA-2008-0503.html
http://www.securityfocus.com/archive/1/493548/100/0/threaded
http://www.securityfocus.com/archive/1/493550/100/0/threaded
http://www.securityfocus.com/bid/29669
http://www.ubuntu.com/usn/usn-616-1
http://www.vupen.com/english/advisories/2008/1803
http://www.vupen.com/english/advisories/2008/1833
http://www.vupen.com/english/advisories/2008/1983/references
http://www.vupen.com/english/advisories/2008/3000
https://exchange.xforce.ibmcloud.com/vulnerabilities/43016
https://issues.rpath.com/browse/RPL-2607
https://issues.rpath.com/browse/RPL-2619
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 x x11 r7.3 -
运行在以下环境
系统 centos_5 xorg-x11-server-Xvfb * Up to
(excluding)
1.1.1-48.41.el5_2.1
运行在以下环境
系统 debian_10 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_11 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_12 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_4.0 xorg-server * Up to
(excluding)
2:1.1.1-21etch5
运行在以下环境
系统 debian_5.0 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2~lenny1
运行在以下环境
系统 opensuse_10.2 xorg-x11 * Up to
(excluding)
7.2-30.15
运行在以下环境
系统 opensuse_10.3 xorg-x11 * Up to
(excluding)
7.1-91.3
运行在以下环境
系统 oracle_5 oraclelinux-release * Up to
(excluding)
1.1.1-48.41.0.1.el5_2.1
运行在以下环境
系统 redhat_5 xorg-x11-server-Xdmx * Up to
(excluding)
0:1.1.1-48.41.el5_2.1
运行在以下环境
系统 suse_11 xorg-x11-Xvnc * Up to
(excluding)
7.4-27.19
阿里云评分
4.6
  • 攻击路径
    远程
  • 攻击复杂度
    N/A
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    EXP 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    N/A
  • 数据完整性
    传输被破坏
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-189 数值错误
阿里云安全产品覆盖情况