First published: Mon Jun 16 2008(Updated: )
Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X11 Fonts Utilities | =r7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1379 has a severity rating that indicates a potential for serious exploitation, allowing context-dependent attackers to read arbitrary process memory.
To fix CVE-2008-1379, update your X.Org Server to a patched version that addresses the integer overflow vulnerability.
CVE-2008-1379 affects the X.Org X11R7.3 server, specifically those utilizing the MIT-SHM extension.
CVE-2008-1379 is a context-dependent vulnerability, meaning attack exploitation typically requires local access or certain conditions to be satisfied.
The impact of CVE-2008-1379 includes potential data exposure, allowing attackers to gain insight into memory from arbitrary processes.