Description
Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
Published: 2008-06-16
Score: 6.8 Medium
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1595-1 New xorg-server packages fix several vulnerabilities
EUVD EUVD EUVD-2008-2357 Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
Ubuntu USN Ubuntu USN USN-616-1 X.org vulnerabilities
References
Link Providers
ftp://ftp.freedesktop.org/pub/xorg/X11R7.3/patches/xorg-xserver-1.4-cve-2008-2361.diff cve-icon cve-icon
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html cve-icon cve-icon
http://lists.freedesktop.org/archives/xorg/2008-June/036026.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2008-0502.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2008-0504.html cve-icon cve-icon
http://secunia.com/advisories/30627 cve-icon cve-icon
http://secunia.com/advisories/30629 cve-icon cve-icon
http://secunia.com/advisories/30630 cve-icon cve-icon
http://secunia.com/advisories/30637 cve-icon cve-icon
http://secunia.com/advisories/30659 cve-icon cve-icon
http://secunia.com/advisories/30664 cve-icon cve-icon
http://secunia.com/advisories/30666 cve-icon cve-icon
http://secunia.com/advisories/30671 cve-icon cve-icon
http://secunia.com/advisories/30715 cve-icon cve-icon
http://secunia.com/advisories/30772 cve-icon cve-icon
http://secunia.com/advisories/30809 cve-icon cve-icon
http://secunia.com/advisories/30843 cve-icon cve-icon
http://secunia.com/advisories/31025 cve-icon cve-icon
http://secunia.com/advisories/31109 cve-icon cve-icon
http://secunia.com/advisories/32099 cve-icon cve-icon
http://secunia.com/advisories/33937 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200806-07.xml cve-icon cve-icon
http://securitytracker.com/id?1020244 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238686-1 cve-icon cve-icon
http://support.apple.com/kb/HT3438 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2008-249.htm cve-icon cve-icon
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0201 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1595 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:115 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:116 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:179 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0503.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/493548/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/493550/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/29665 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-616-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1803 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1833 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1983/references cve-icon cve-icon
https://issues.rpath.com/browse/RPL-2607 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-2619 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-2361 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8978 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-2361 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T08:58:02.084Z

Reserved: 2008-05-21T00:00:00.000Z

Link: CVE-2008-2361

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-06-16T19:41:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-2361

cve-icon Redhat

Severity : Important

Publid Date: 2008-06-11T00:00:00Z

Links: CVE-2008-2361 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses