CVE-2003-0625
CVSS6.4
发布时间 :2003-08-27 00:00:00
修订时间 :2016-10-17 22:36:02
NMCOES    

[原文]Off-by-one error in certain versions of xfstt allows remote attackers to read potentially sensitive memory via a malformed client request in the connection handshake, which leaks the memory in the server's response.


[CNNVD]xfstt未明内存泄漏漏洞(CNNVD-200308-152)

        xfstt的某个版本存在Off-by-one错误。远程攻击者可以借助握手连接中的畸形客户端请求读取潜在敏感内存,该漏洞泄漏服务器响应中的内存。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:xfstt:xfstt:1.2.1
cpe:/a:xfstt:xfstt:1.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0625
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0625
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-152
(官方数据源) CNNVD

- 其它链接及资源

http://developer.berlios.de/forum/forum.php?forum_id=2819
(UNKNOWN)  CONFIRM  http://developer.berlios.de/forum/forum.php?forum_id=2819
http://marc.info/?l=bugtraq&m=105941103709264&w=2
(UNKNOWN)  BUGTRAQ  20030727 [PAPER]: Address relay fingerprinting.
http://www.debian.org/security/2003/dsa-360
(VENDOR_ADVISORY)  DEBIAN  DSA-360
http://www.securityfocus.com/bid/8255
(VENDOR_ADVISORY)  BID  8255

- 漏洞信息

xfstt未明内存泄漏漏洞
中危 边界条件错误
2003-08-27 00:00:00 2005-10-20 00:00:00
远程  
        xfstt的某个版本存在Off-by-one错误。远程攻击者可以借助握手连接中的畸形客户端请求读取潜在敏感内存,该漏洞泄漏服务器响应中的内存。

- 公告与补丁

        Debian has released a security advisory (DSA 360-1) that contains fixes to address this issue. Information relating to obtaining and applying fixes can be found in the referenced advisory.
        xfstt xfstt 1.2.1
        

- 漏洞信息 (22952)

xfstt 1.2/1.4 Unspecified Memory Disclosure Vulnerability (EDBID:22952)
linux dos
2003-07-23 Verified
0 V9
N/A [点击下载]
source: http://www.securityfocus.com/bid/8255/info

xfstt is reported to be prone to an unspecified memory disclosure vulnerability. This issue can be triggered by remote attackers to cause a denial of service. The server may also return details about the memory layout of the underlying system when this issue is triggered.

# telnet localhost 7101
Trying 127.0.0.1...
Connected to localhost.localdomain.
Escape character is '^]'.
xxxxxxx
HDxxxxxxx

þ@Connection closed by foreign host.		

- 漏洞信息

11804
TrueType Font Server for X11 (xfstt) Off-by-one Arbitrary Memory Disclosure
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Unknown

- 漏洞描述

TrueType Font Server for X11 (xfstt) contains a flaw that may lead to an unauthorized information disclosure. The issue is due to an off-by-one error in the connection handshake. By sending a specially crafted client request during the connection handshake, a remote attacker may potentially access sensitive portions of memory in the server response, resulting in a loss of confidentiality.

- 时间线

2003-07-31 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.5.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

xfstt Unspecified Memory Disclosure Vulnerability
Boundary Condition Error 8255
Yes No
2003-07-23 12:00:00 2009-07-11 10:56:00
Discovery of this issue is credited to Vade 79 <v9@fakehalo.deadpig.org>.

- 受影响的程序版本

xfstt xfstt 1.4
xfstt xfstt 1.2.1
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha

- 漏洞讨论

xfstt is reported to be prone to an unspecified memory disclosure vulnerability. This issue can be triggered by remote attackers to cause a denial of service. The server may also return details about the memory layout of the underlying system when this issue is triggered.

- 漏洞利用

The following proof-of-concept was provided:

# telnet localhost 7101
Trying 127.0.0.1...
Connected to localhost.localdomain.
Escape character is '^]'.
xxxxxxx
HDxxxxxxx

þ@Connection closed by foreign host.

- 解决方案

Debian has released a security advisory (DSA 360-1) that contains fixes to address this issue. Information relating to obtaining and applying fixes can be found in the referenced advisory.


xfstt xfstt 1.2.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站