Description
Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1466-1 | New xorg-server packages fix several vulnerabilities |
Debian DSA |
DSA-1466-2 | New xorg-server packages fix regression |
Debian DSA |
DSA-1466-3 | New xfree86 packages fix regression |
EUVD |
EUVD-2007-6395 | Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension. |
Ubuntu USN |
USN-571-1 | X.org vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T16:02:37.086Z
Reserved: 2007-12-18T00:00:00.000Z
Link: CVE-2007-6429
No data.
Status : Modified
Published: 2008-01-18T23:00:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-6429
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN