First published: Tue Jan 08 2008(Updated: )
Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/1.3.1 | <2. | 2. |
Ubuntu X.Org Xserver | <=1.4 | |
SUSE LibXfont | ||
Sun Solaris |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0006 has a high severity rating due to the potential for arbitrary code execution from a buffer overflow.
To fix CVE-2008-0006, update the X.Org Xserver and the affected libfont and libXfont libraries to their latest stable versions.
CVE-2008-0006 affects systems running X.Org Xserver versions before 1.4.1, and certain versions of libfont and libXfont on platforms like Sun Solaris.
CVE-2008-0006 allows context-dependent attackers to execute arbitrary code by exploiting a buffer overflow through specially crafted PCF fonts.
CVE-2008-0006 is less of a concern in modern systems that have applied necessary updates, but it remains important to ensure all software is current.