X.Org.XFS.Swap.Char2b.Function.Buffer.Overflow

description-logoDescription

This indicates an attempt to exploit a heap corruption vulnerability in X.Org X Font Server (xfs).
The vulnerability is caused by an error that occurs in the swap_char2b() function when it handles "QueryXBitmaps" and "QueryXExtents" protocol requests. It allows remote attackers to execute arbitrary code by sending a crafted "QueryXBitmaps" or "QueryXExtents" request packet.

affected-products-logoAffected Products

X.org xfs 1.0.4

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems

recomended-action-logoRecommended Actions

Apply the appropriate patch, available from the Web sites below.
Sun Solaris 10_x86
Sun 119060-31
x86
Sun Solaris 10
Sun 119059-32
Sparc
Sun Solaris 9
Sun 113923-04
Sparc
IBM AIX 5.2
IBM xfs_ifix.tar
ftp://aix.software.ibm.com/aix/efixes/security/xfs_ifix.tar
IBM IZ06001
http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html
Sun Solaris 9_x86
Sun 113924-04
x86
IBM AIX 5.3
IBM xfs_ifix.tar
ftp://aix.software.ibm.com/aix/efixes/security/xfs_ifix.tar
IBM IZ06648
http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html
X.org xfs 1.0.4
X.org xorg-xfs-1.0.4-query.diff
ftp://ftp.freedesktop.org/pub/X11R7.3/patches/xorg-xfs-1.0.4-query.dif f

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-11 16.978