{"vuid":"VU#820006","idnumber":"820006","name":"XFree86 vulnerable to buffer overflow via crafted font directory in 'fonts.alias' file","keywords":["XFree86","buffer overflow","arbitrary code execution","font.alias","fonts.alias"],"overview":"XFree86 contains a vulnerability in the parsing of the 'fonts.alias' file, which could be exploited by a local user to execute arbitrary code with elevated privileges.","clean_desc":"XFree86 contains a flaw during the processing of the 'fonts.alias' file. XFree86 is an implementation of the X Window System. The 'fonts.alias' file is used to map new names to existing fonts and must be placed in any directory of the font-path. When reading user input from the file it stores the user supplied data for the font directory in a fixed-length buffer. It fails to check the length of the user input, leading to a buffer overflow condition.","impact":"A local authenticated user may craft a 'fonts.alias' file to exploit this buffer overflow vulnerability, leading to execution of arbitrary code with root privileges. The local user must have privileges to write to one of the directories in the font-path to exploit this vulnerability.","resolution":"Upgrade or Patch\nThis issue is resolved in XFree86 4.3.0.2. Upgrade or apply patches as specified by your vendor.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Greg MacManus.","author":"This document was written by Will Dormann.","public":["http://www.idefense.com/application/poi/display?id=72&type=vulnerabilities","http://xforce.iss.net/xforce/xfdb/15130","http://www.securityfocus.com/bid/9636","http://www.osvdb.org/displayvuln.php?osvdb_id=3905","http://www.xfree86.org/cvs/changes_4_3.html"],"cveids":["CVE-2004-0083"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-02-13T19:14:51Z","publicdate":"2004-02-10T00:00:00Z","datefirstpublished":"2004-12-07T20:06:06Z","dateupdated":"2005-10-26T17:22:05Z","revision":24,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"20","cam_impact":"19","cam_easeofexploitation":"15","cam_attackeraccessrequired":"5","cam_scorecurrent":"9.61875","cam_scorecurrentwidelyknown":"12.290625","cam_scorecurrentwidelyknownexploited":"22.978125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.61875,"vulnote":null}