xfstt-1.4 vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



---------------------------------------------------------------
ERA IT Solutions  AG            http://www.era-it.ch

Security Advisory  -   xfstt-1.4 vulnerability   -   11/07/2003
---------------------------------------------------------------

1. Vulnerability description
2. Impact
3. Notification status
4. Exploit status
5. Contact

---------------------------------------------------------------


1. Vulnerability description


The X Fontserver for Truetype fonts 1.4 (http://developer.berlios.de/projects/xfstt/
<http://freshmeat.net/redir/xfstt/11925/url_homepage/xfstt>) contains vulnerability
holes which can be initiated remotely.


In xfstt.cc:working() the switch(buf[0]) { .. } statement is very insecurely
implemented. No boundary checks on any network-received buffers are done.
At least in two cases, namely FS_QueryXExtents8 and FS_QueryXBitmaps8, it is possible
to arrange a packet which sets 'req->num_ranges' to a very big number that causes an
array out of boundary access within the next for-loop. This bug leads to a segmentation
fault of the specific child and might even let an attacker execute arbitrary code.



2. Impact


It's yet unclear if this bug is exploitable or not. With a specially crafted
packet you can disable/DoS the daemon.


3. Notification status


The Author of xfstt (Guillem Jover) has been notified on May 28, 2003. There is no
patch available, though version 1.5 is soon to be released.



4. Exploit status


A proof-of-concept DoS exploit exists, albeit unreleased.


5. Contact


era@era-it.ch

---------------------------------------------------------------

Thanks to Jonathan Heusser who originally found this bug.



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux