CVE-2007-4730

Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.
References
Link Resource
http://bugs.freedesktop.org/show_bug.cgi?id=7447
http://bugs.gentoo.org/show_bug.cgi?id=191964
http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html
http://osvdb.org/37726
http://secunia.com/advisories/26743 Patch Vendor Advisory
http://secunia.com/advisories/26755 Patch Vendor Advisory
http://secunia.com/advisories/26763
http://secunia.com/advisories/26823
http://secunia.com/advisories/26859
http://secunia.com/advisories/26897
http://secunia.com/advisories/27147
http://secunia.com/advisories/27179
http://secunia.com/advisories/27228
http://secunia.com/advisories/30161
http://security.gentoo.org/glsa/glsa-200710-16.xml
http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187
http://www.debian.org/security/2007/dsa-1372 Patch
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:178
http://www.mandriva.com/security/advisories?name=MDVSA-2008:022
http://www.novell.com/linux/security/advisories/2007_54_xorg.html
http://www.redhat.com/support/errata/RHSA-2007-0898.html
http://www.securityfocus.com/bid/25606
http://www.securitytracker.com/id?1018665
http://www.ubuntu.com/usn/usn-514-1
http://www.vupen.com/english/advisories/2007/3098
https://exchange.xforce.ibmcloud.com/vulnerabilities/36535
https://issues.rpath.com/browse/RPL-1728
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430
http://bugs.freedesktop.org/show_bug.cgi?id=7447
http://bugs.gentoo.org/show_bug.cgi?id=191964
http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html
http://osvdb.org/37726
http://secunia.com/advisories/26743 Patch Vendor Advisory
http://secunia.com/advisories/26755 Patch Vendor Advisory
http://secunia.com/advisories/26763
http://secunia.com/advisories/26823
http://secunia.com/advisories/26859
http://secunia.com/advisories/26897
http://secunia.com/advisories/27147
http://secunia.com/advisories/27179
http://secunia.com/advisories/27228
http://secunia.com/advisories/30161
http://security.gentoo.org/glsa/glsa-200710-16.xml
http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187
http://www.debian.org/security/2007/dsa-1372 Patch
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:178
http://www.mandriva.com/security/advisories?name=MDVSA-2008:022
http://www.novell.com/linux/security/advisories/2007_54_xorg.html
http://www.redhat.com/support/errata/RHSA-2007-0898.html
http://www.securityfocus.com/bid/25606
http://www.securitytracker.com/id?1018665
http://www.ubuntu.com/usn/usn-514-1
http://www.vupen.com/english/advisories/2007/3098
https://exchange.xforce.ibmcloud.com/vulnerabilities/36535
https://issues.rpath.com/browse/RPL-1728
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:x.org:xorg-server:1.01:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.02:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://bugs.freedesktop.org/show_bug.cgi?id=7447 - () http://bugs.freedesktop.org/show_bug.cgi?id=7447 -
References () http://bugs.gentoo.org/show_bug.cgi?id=191964 - () http://bugs.gentoo.org/show_bug.cgi?id=191964 -
References () http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html - () http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html -
References () http://osvdb.org/37726 - () http://osvdb.org/37726 -
References () http://secunia.com/advisories/26743 - Patch, Vendor Advisory () http://secunia.com/advisories/26743 - Patch, Vendor Advisory
References () http://secunia.com/advisories/26755 - Patch, Vendor Advisory () http://secunia.com/advisories/26755 - Patch, Vendor Advisory
References () http://secunia.com/advisories/26763 - () http://secunia.com/advisories/26763 -
References () http://secunia.com/advisories/26823 - () http://secunia.com/advisories/26823 -
References () http://secunia.com/advisories/26859 - () http://secunia.com/advisories/26859 -
References () http://secunia.com/advisories/26897 - () http://secunia.com/advisories/26897 -
References () http://secunia.com/advisories/27147 - () http://secunia.com/advisories/27147 -
References () http://secunia.com/advisories/27179 - () http://secunia.com/advisories/27179 -
References () http://secunia.com/advisories/27228 - () http://secunia.com/advisories/27228 -
References () http://secunia.com/advisories/30161 - () http://secunia.com/advisories/30161 -
References () http://security.gentoo.org/glsa/glsa-200710-16.xml - () http://security.gentoo.org/glsa/glsa-200710-16.xml -
References () http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm - () http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm -
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187 - () http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187 -
References () http://www.debian.org/security/2007/dsa-1372 - Patch () http://www.debian.org/security/2007/dsa-1372 - Patch
References () http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml - () http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:178 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:178 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:022 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:022 -
References () http://www.novell.com/linux/security/advisories/2007_54_xorg.html - () http://www.novell.com/linux/security/advisories/2007_54_xorg.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0898.html - () http://www.redhat.com/support/errata/RHSA-2007-0898.html -
References () http://www.securityfocus.com/bid/25606 - () http://www.securityfocus.com/bid/25606 -
References () http://www.securitytracker.com/id?1018665 - () http://www.securitytracker.com/id?1018665 -
References () http://www.ubuntu.com/usn/usn-514-1 - () http://www.ubuntu.com/usn/usn-514-1 -
References () http://www.vupen.com/english/advisories/2007/3098 - () http://www.vupen.com/english/advisories/2007/3098 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36535 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36535 -
References () https://issues.rpath.com/browse/RPL-1728 - () https://issues.rpath.com/browse/RPL-1728 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430 -

Information

Published : 2007-09-11 19:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4730

Mitre link : CVE-2007-4730

CVE.ORG link : CVE-2007-4730


JSON object : View

Products Affected

x.org

  • xorg-server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer