Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2019.2357 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for libXfont (EulerOS-SA-2019-2357) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'libXfont' package(s) announced via the EulerOS-SA-2019-2357 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'libXfont' package(s) announced via the EulerOS-SA-2019-2357 advisory. Vulnerability Insight: The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.(CVE-2011-2895) In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server.(CVE-2017-13722) In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.(CVE-2017-13720) In libXfont before 1.5.4 and libXfont2 before 2.0.3, a local attacker can open (but not read) files on the system as root, triggering tape rewinds, watchdogs, or similar mechanisms that can be triggered by opening files.(CVE-2017-16611) Affected Software/OS: 'libXfont' package(s) on Huawei EulerOS V2.0SP2. Solution: Please install the updated package(s). CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-2895 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.apple.com/archives/security-announce/2012/May/msg00001.html http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html BugTraq ID: 49124 http://www.securityfocus.com/bid/49124 Debian Security Information: DSA-2293 (Google Search) http://www.debian.org/security/2011/dsa-2293 http://www.mandriva.com/security/advisories?name=MDVSA-2011:153 http://www.openwall.com/lists/oss-security/2011/08/10/10 http://lists.freedesktop.org/archives/xorg-announce/2011-August/001721.html http://lists.freedesktop.org/archives/xorg-announce/2011-August/001722.html NETBSD Security Advisory: NetBSD-SA2011-007 http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-007.txt.asc http://www.redhat.com/support/errata/RHSA-2011-1154.html http://www.redhat.com/support/errata/RHSA-2011-1155.html http://www.redhat.com/support/errata/RHSA-2011-1161.html http://www.redhat.com/support/errata/RHSA-2011-1834.html http://securitytracker.com/id?1025920 http://secunia.com/advisories/45544 http://secunia.com/advisories/45568 http://secunia.com/advisories/45599 http://secunia.com/advisories/45986 http://secunia.com/advisories/46127 http://secunia.com/advisories/48951 SuSE Security Announcement: SUSE-SU-2011:1035 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00019.html SuSE Security Announcement: openSUSE-SU-2011:1299 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00004.html http://www.ubuntu.com/usn/USN-1191-1 XForce ISS Database: xorg-lzw-bo(69141) https://exchange.xforce.ibmcloud.com/vulnerabilities/69141 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |