FreeBSD : Buffer overflows in XFree86 servers (3837f462-5d6b-11d8-80e3-0020ed76ef5a)

critical Nessus Plugin ID 37616

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A number of buffer overflows were recently discovered in XFree86, prompted by initial discoveries by iDEFENSE. These buffer overflows are present in the font alias handling. An attacker with authenticated access to a running X server may exploit these vulnerabilities to obtain root privileges on the machine running the X server.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?e8ff1873

http://www.nessus.org/u?c48e2678

http://www.nessus.org/u?f549dee6

Plugin Details

Severity: Critical

ID: 37616

File Name: freebsd_pkg_3837f4625d6b11d880e30020ed76ef5a.nasl

Version: 1.16

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xfree86-server, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/12/2004

Vulnerability Publication Date: 2/10/2004

Reference Information

CVE: CVE-2004-0083, CVE-2004-0084, CVE-2004-0106

BID: 9652, 9655, 9636