Lucene search

K
nessusThis script is Copyright (C) 2004-2021 Tenable Network Security, Inc.SUSE_SA_2004_006.NASL
HistoryJul 25, 2004 - 12:00 a.m.

SuSE-SA:2004:006: xf86/XFree86

2004-07-2500:00:00
This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.
www.tenable.com
19

The remote host is missing the patch for the advisory SuSE-SA:2004:006 (xf86/XFree86).

XFree86 is an open source X Window System implementation that acts as a client-server-based API between different hardware components like display, mouse, keyboard and so on.
Several buffer overflows were found in the fontfile code that handles a user-supplied ‘fonts.alias’ file. The file is processed with root privileges and therefore a successful exploitation of these bugs leads to local root access.

There is no known workaround.

Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement.
Then, to apply the update use the command ‘rpm -Fhv file.rpm’.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SuSE-SA:2004:006
#


if ( ! defined_func("bn_random") ) exit(0);

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(13824);
 script_version("1.15");
 script_cve_id("CVE-2004-0083", "CVE-2004-0084", "CVE-2004-0106");
 
 name["english"] = "SuSE-SA:2004:006: xf86/XFree86";
 
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
 script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SuSE-SA:2004:006 (xf86/XFree86).


XFree86 is an open source X Window System implementation that acts
as a client-server-based API between different hardware components
like display, mouse, keyboard and so on.
Several buffer overflows were found in the fontfile code that handles
a user-supplied 'fonts.alias' file. The file is processed with root
privileges and therefore a successful exploitation of these bugs leads
to local root access.

There is no known workaround.

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, to apply the update use the command 'rpm -Fhv file.rpm'." );
 script_set_attribute(attribute:"solution", value:
"http://www.suse.de/security/2004_06_xf86.html" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");




 script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/25");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
 script_end_attributes();

 
 summary["english"] = "Check for the version of the xf86/XFree86 package";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
 family["english"] = "SuSE Local Security Checks";
 script_family(english:family["english"]);
 
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/SuSE/rpm-list");
 exit(0);
}

include("rpm.inc");
if ( rpm_check( reference:"xf86-4.2.0-257", release:"SUSE8.0") )
{
 security_hole(0);
 exit(0);
}
if ( rpm_check( reference:"xf86-4.2.0-257", release:"SUSE8.1") )
{
 security_hole(0);
 exit(0);
}
if ( rpm_check( reference:"XFree86-4.3.0-120", release:"SUSE8.2") )
{
 security_hole(0);
 exit(0);
}
if ( rpm_check( reference:"XFree86-4.3.0.1-46", release:"SUSE9.0") )
{
 security_hole(0);
 exit(0);
}
if (rpm_exists(rpm:"xf86-", release:"SUSE8.0")
 || rpm_exists(rpm:"xf86-", release:"SUSE8.1")
 || rpm_exists(rpm:"xf86-", release:"SUSE8.2")
 || rpm_exists(rpm:"xf86-", release:"SUSE9.0") )
{
 set_kb_item(name:"CVE-2004-0083", value:TRUE);
 set_kb_item(name:"CVE-2004-0084", value:TRUE);
 set_kb_item(name:"CVE-2004-0106", value:TRUE);
}