First published: Fri Jan 18 2008(Updated: )
The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org Xserver | <1.4.1 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Debian Linux | =3.1 | |
Debian Linux | =4.0 | |
Apple iOS and macOS | <10.4.11 | |
Apple iOS and macOS | >=10.5.0<10.5.2 | |
Red Hat Fedora | =7 | |
Red Hat Fedora | =8 | |
openSUSE | =10.2 | |
openSUSE | =10.3 | |
SUSE Linux Distribution | =10.1 | |
SUSE Linux Enterprise Desktop | =9 | |
SUSE Linux Enterprise Desktop | =10 | |
SUSE Linux Enterprise Desktop | =10-sp1 | |
SUSE Linux Enterprise Server | =8 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp1 | |
Novell Open Enterprise Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6427 has a high severity rating due to its potential to allow arbitrary code execution.
To fix CVE-2007-6427, upgrade to X.Org Xserver version 1.4.1 or later.
CVE-2007-6427 affects various systems including older versions of X.org, Ubuntu, Debian, macOS, Fedora, and openSUSE.
Yes, CVE-2007-6427 can be exploited by context-dependent attackers remotely if they can send specific requests.
CVE-2007-6427 is different from CVE-2007-4990, although both involve vulnerabilities in the XInput extension.