中危 x11 拒绝服务漏洞

CVE编号

CVE-2008-2361

利用情况

EXP 已公开

补丁情况

官方补丁

披露时间

2008-06-17
该漏洞EXP已公开传播,漏洞利用成本极低,建议您立即关注并修复。
漏洞描述
X.Org X11R7.3中X服务器1.4的Render扩展中的ProcRenderCreateCursor函数中的整数溢出允许依赖于上下文的攻击者通过用于计算字形缓冲区大小的未指定请求字段触发取消引用未映射的内存,从而导致拒绝服务(守护程序崩溃) ,。

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-...
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.freedesktop.org/archives/xorg/2008-June/036026.html
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
http://rhn.redhat.com/errata/RHSA-2008-0502.html
http://rhn.redhat.com/errata/RHSA-2008-0504.html
http://secunia.com/advisories/30627
http://secunia.com/advisories/30629
http://secunia.com/advisories/30630
http://secunia.com/advisories/30637
http://secunia.com/advisories/30659
http://secunia.com/advisories/30664
http://secunia.com/advisories/30666
http://secunia.com/advisories/30671
http://secunia.com/advisories/30715
http://secunia.com/advisories/30772
http://secunia.com/advisories/30809
http://secunia.com/advisories/30843
http://secunia.com/advisories/31025
http://secunia.com/advisories/31109
http://secunia.com/advisories/32099
http://secunia.com/advisories/33937
http://security.gentoo.org/glsa/glsa-200806-07.xml
http://securitytracker.com/id?1020244
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1
http://support.apple.com/kb/HT3438
http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201
http://www.debian.org/security/2008/dsa-1595
http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:115
http://www.mandriva.com/security/advisories?name=MDVSA-2008:116
http://www.mandriva.com/security/advisories?name=MDVSA-2008:179
http://www.redhat.com/support/errata/RHSA-2008-0503.html
http://www.securityfocus.com/archive/1/493548/100/0/threaded
http://www.securityfocus.com/archive/1/493550/100/0/threaded
http://www.securityfocus.com/bid/29665
http://www.ubuntu.com/usn/usn-616-1
http://www.vupen.com/english/advisories/2008/1803
http://www.vupen.com/english/advisories/2008/1833
http://www.vupen.com/english/advisories/2008/1983/references
https://issues.rpath.com/browse/RPL-2607
https://issues.rpath.com/browse/RPL-2619
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 xorg x11 r7.3 -
运行在以下环境
系统 centos_5 xorg-x11-server-Xvfb * Up to
(excluding)
1.1.1-48.41.el5_2.1
运行在以下环境
系统 debian_10 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_11 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_12 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2
运行在以下环境
系统 debian_4.0 xorg-server * Up to
(excluding)
2:1.1.1-21etch5
运行在以下环境
系统 debian_5.0 xorg-server * Up to
(excluding)
2:1.4.1~git20080517-2~lenny1
运行在以下环境
系统 opensuse_10.2 xorg-x11 * Up to
(excluding)
7.2-30.15
运行在以下环境
系统 opensuse_10.3 xorg-x11 * Up to
(excluding)
7.1-91.3
运行在以下环境
系统 oracle_5 oraclelinux-release * Up to
(excluding)
1.1.1-48.41.0.1.el5_2.1
运行在以下环境
系统 redhat_5 xorg-x11-server-Xdmx * Up to
(excluding)
0:1.1.1-48.41.el5_2.1
运行在以下环境
系统 suse_11 xorg-x11-Xvnc * Up to
(excluding)
7.4-27.19
阿里云评分
5.1
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    EXP 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    传输被破坏
  • 服务器危害
    DoS
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-189 数值错误
阿里云安全产品覆盖情况