Vulnerability Name:

CVE-2004-0083 (CCN-15130)

Assigned:2004-02-08
Published:2004-02-08
Updated:2017-10-11
Summary:Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: SCO Security Advisory SCOSA-2004.3
Xsco contains a buffer overflow that could be exploited to gain root privileges

Source: CCN
Type: SCO Security Advisory SCOSA-2004.2
Xsco contains a buffer overflow that could be exploited to gain root privileges

Source: CCN
Type: BugTraq Mailing List, Fri Jul 30 2004 - 15:27:24 CDT
Fri Jul 30 2004 - 15:27:24 CDT

Source: CCN
Type: Sun Security Alert ID: 57768
Multiple Security Vulnerabilities in Xsun and Xprt Server Font Handling

Source: MITRE
Type: CNA
CVE-2004-0083

Source: CONECTIVA
Type: UNKNOWN
CLA-2004:821

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2004:821
XFree86

Source: BUGTRAQ
Type: UNKNOWN
20040210 iDEFENSESecurityAdvisory02.10.04: XFree86FontInformationFileBufferOverflow

Source: BUGTRAQ
Type: UNKNOWN
20040211 XFree86 vulnerability exploit

Source: FEDORA
Type: UNKNOWN
FLSA:2314

Source: CCN
Type: RHSA-2004-059
Updated XFree86 packages fix privilege escalation vulnerability

Source: CCN
Type: RHSA-2004-060
XFree86 security update

Source: CCN
Type: RHSA-2004-061
XFree86 security update

Source: GENTOO
Type: Vendor Advisory
GLSA-200402-02

Source: SUNALERT
Type: UNKNOWN
57768

Source: CCN
Type: CIAC Information Bulletin O-081
Red Hat Updated XFree86 Packages Fix Privilege Escalation Vulnerability

Source: DEBIAN
Type: UNKNOWN
DSA-443

Source: DEBIAN
Type: DSA-443
xfree86 -- several vulnerabilities

Source: CCN
Type: GLSA-200402-02
XFree86 Font Information File Buffer Overflow

Source: MISC
Type: UNKNOWN
http://www.idefense.com/application/poi/display?id=72

Source: CCN
Type: iDEFENSE Security Advisory 02.10.04:
XFree86 Font Information File Buffer Overflow

Source: CCN
Type: US-CERT VU#820006
XFree86 vulnerable to buffer overflow via crafted font directory in `fonts.alias` file

Source: CERT-VN
Type: US Government Resource
VU#820006

Source: CCN
Type: Gentoo Linux Security Announcement 200402-02
XFree86 Font Information File Buffer Overflow

Source: CCN
Type: Immunix Secured OS Security Advisory IMNX-2004-73-002-01
XFree86

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2004:012

Source: SUSE
Type: UNKNOWN
SuSE-SA:2004:006

Source: REDHAT
Type: UNKNOWN
RHSA-2004:059

Source: REDHAT
Type: UNKNOWN
RHSA-2004:060

Source: REDHAT
Type: UNKNOWN
RHSA-2004:061

Source: BID
Type: Exploit, Patch, Vendor Advisory
9636

Source: CCN
Type: BID-9636
XFree86 Font Information File Buffer Overflow Vulnerability

Source: SLACKWARE
Type: UNKNOWN
SSA:2004-043

Source: CCN
Type: slackware-security Mailing List, Thu, 12 Feb 2004 12:19:25 -0800 (PST)
XFree86 security update (SSA:2004-043-02)

Source: CCN
Type: TLSA-2004-5
Font file buffer overlows

Source: CONFIRM
Type: Vendor Advisory
http://www.xfree86.org/cvs/changes

Source: XF
Type: UNKNOWN
xfree86-fontalias-bo(15130)

Source: XF
Type: UNKNOWN
xfree86-fontalias-bo(15130)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:806

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:830

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9612

Source: SUSE
Type: SUSE-SA:2004:006
xf86/XFree86: local privilege escalation

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xfree86_project:x11r6:4.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:xfree86_project:x11r6:4.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:xfree86_project:x11r6:4.1.12:*:*:*:*:*:*:*
  • OR cpe:/a:xfree86_project:x11r6:4.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:xfree86_project:x11r6:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:xfree86_project:x11r6:4.2.1:*:errata:*:*:*:*:*
  • OR cpe:/a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.4:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20040083
    V
    CVE-2004-0083
    2015-11-16
    oval:org.mitre.oval:def:9612
    V
    Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
    2013-04-29
    oval:org.mitre.oval:def:806
    V
    Red Hat XFree86 Buffer Overflow in ReadFontAlias
    2007-04-25
    oval:org.mitre.oval:def:830
    V
    XFree86 Buffer Overflow in dirfile
    2007-04-25
    oval:org.debian:def:443
    V
    several vulnerabilities
    2004-02-19
    oval:com.redhat.rhsa:def:20040061
    P
    RHSA-2004:061: XFree86 security update (Important)
    2004-02-16
    BACK
    xfree86_project x11r6 4.1.0
    xfree86_project x11r6 4.1.11
    xfree86_project x11r6 4.1.12
    xfree86_project x11r6 4.2.0
    xfree86_project x11r6 4.2.1
    xfree86_project x11r6 4.2.1
    xfree86_project x11r6 4.3.0
    openbsd openbsd 3.3
    openbsd openbsd 3.4