Vulnerability Name: | CVE-2003-0625 (CCN-12809) | ||||||||
Assigned: | 2003-07-31 | ||||||||
Published: | 2003-07-31 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | Off-by-one error in certain versions of xfstt allows remote attackers to read potentially sensitive memory via a malformed client request in the connection handshake, which leaks the memory in the server's response. | ||||||||
CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2003-0625 Source: CCN Type: BerliOS Developer Web site New xfstt release: 1.5.1 Source: CONFIRM Type: UNKNOWN http://developer.berlios.de/forum/forum.php?forum_id=2819 Source: CCN Type: Xfstt Web site Xfstt 1.5.1 Source: BUGTRAQ Type: UNKNOWN 20030727 [PAPER]: Address relay fingerprinting. Source: DEBIAN Type: Patch, Vendor Advisory DSA-360 Source: DEBIAN Type: DSA-360 xfstt -- several vulnerabilities Source: CCN Type: OSVDB ID: 11804 TrueType Font Server for X11 (xfstt) Off-by-one Arbitrary Memory Disclosure Source: BID Type: Exploit, Vendor Advisory 8255 Source: CCN Type: BID-8255 xfstt Unspecified Memory Disclosure Vulnerability Source: XF Type: UNKNOWN truetype-offbyone-memory-leak(12809) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |