FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  374986
Date:      2014-12-20
Time:      00:21:30Z
Committer: delphij

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
b060ee50-daba-11e3-99f2-bcaec565249clibXfont -- X Font Service Protocol and Font metadata file handling issues

Alan Coopersmith reports:

Ilja van Sprundel, a security researcher with IOActive, has discovered several issues in the way the libXfont library handles the responses it receives from xfs servers, and has worked with X.Org's security team to analyze, confirm, and fix these issues.

Most of these issues stem from libXfont trusting the font server to send valid protocol data, and not verifying that the values will not overflow or cause other damage. This code is commonly called from the X server when an X Font Server is active in the font path, so may be running in a setuid-root process depending on the X server in use. Exploits of this path could be used by a local, authenticated user to attempt to raise privileges; or by a remote attacker who can control the font server to attempt to execute code with the privileges of the X server.


Discovery 2014-05-13
Entry 2014-05-13
libXfont
lt 1.4.7_3

CVE-2014-0209
CVE-2014-0210
CVE-2014-0211
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
fe2b6597-c9a4-11dc-8da8-0008a18a9961xorg -- multiple vulnerabilities

Matthieu Herrb of X.Org reports:

Several vulnerabilities have been identified in server code of the X window system caused by lack of proper input validation on user controlled data in various parts of the software, causing various kinds of overflows.

Exploiting these overflows will crash the X server or, under certain circumstances allow the execution of arbitray machine code.

When the X server is running with root privileges (which is the case for the Xorg server and for most kdrive based servers), these vulnerabilities can thus also be used to raise privileges.

All these vulnerabilities, to be exploited succesfully, require either an already established connection to a running X server (and normally running X servers are only accepting authenticated connections), or a shell access with a valid user on the machine where the vulnerable server is installed.


Discovery 2008-01-18
Entry 2008-01-23
xorg-server
lt 1.4_4,1

libXfont
lt 1.3.1_2,1

CVE-2007-5760
CVE-2007-5958
CVE-2007-6427
CVE-2007-6428
CVE-2007-6429
CVE-2008-0006
http://lists.freedesktop.org/archives/xorg/2008-January/031918.html
http://lists.freedesktop.org/archives/xorg/2008-January/032099.html
http://secunia.com/advisories/28532/
28c575fa-784e-11e3-8249-001cc0380077libXfont -- Stack buffer overflow in parsing of BDF font files in libXfont

freedesktop.org reports:

A BDF font file containing a longer than expected string can cause a buffer overflow on the stack. Testing in X servers built with Stack Protector restulted in an immediate crash when reading a user-proveded specially crafted font.

As libXfont is used to read user-specified font files in all X servers distributed by X.Org, including the Xorg server which is often run with root privileges or as setuid-root in order to access hardware, this bug may lead to an unprivileged user acquiring root privileges in some systems.


Discovery 2013-12-24
Entry 2014-01-08
libXfont
lt 1.4.7,1

CVE-2013-6462
http://lists.x.org/archives/xorg-announce/2014-January/002389.html
304409c3-c3ef-11e0-8aa5-485d60cb5385libXfont -- possible local privilege escalation

Tomas Hoger reports:

The compress/ LZW decompress implentation does not correctly handle compressed streams that contain code words that were not yet added to the decompression table. This may lead to arbitrary memory corruption. Successfull exploitation may possible lead to a local privilege escalation.


Discovery 2011-07-26
Entry 2011-08-11
Modified 2012-03-13
libXfont
lt 1.4.4_1,1

CVE-2011-2895
https://bugzilla.redhat.com/show_bug.cgi?id=725760
fe2b6597-c9a4-11dc-8da8-0008a18a9961xorg -- multiple vulnerabilities

Matthieu Herrb of X.Org reports:

Several vulnerabilities have been identified in server code of the X window system caused by lack of proper input validation on user controlled data in various parts of the software, causing various kinds of overflows.

Exploiting these overflows will crash the X server or, under certain circumstances allow the execution of arbitray machine code.

When the X server is running with root privileges (which is the case for the Xorg server and for most kdrive based servers), these vulnerabilities can thus also be used to raise privileges.

All these vulnerabilities, to be exploited succesfully, require either an already established connection to a running X server (and normally running X servers are only accepting authenticated connections), or a shell access with a valid user on the machine where the vulnerable server is installed.


Discovery 2008-01-18
Entry 2008-01-23
xorg-server
lt 1.4_4,1

libXfont
lt 1.3.1_2,1

CVE-2007-5760
CVE-2007-5958
CVE-2007-6427
CVE-2007-6428
CVE-2007-6429
CVE-2008-0006
http://lists.freedesktop.org/archives/xorg/2008-January/031918.html
http://lists.freedesktop.org/archives/xorg/2008-January/032099.html
http://secunia.com/advisories/28532/
304409c3-c3ef-11e0-8aa5-485d60cb5385libXfont -- possible local privilege escalation

Tomas Hoger reports:

The compress/ LZW decompress implentation does not correctly handle compressed streams that contain code words that were not yet added to the decompression table. This may lead to arbitrary memory corruption. Successfull exploitation may possible lead to a local privilege escalation.


Discovery 2011-07-26
Entry 2011-08-11
Modified 2012-03-13
libXfont
lt 1.4.4_1,1

CVE-2011-2895
https://bugzilla.redhat.com/show_bug.cgi?id=725760