Lucene search

K
nvd[email protected]NVD:CVE-2007-1352
HistoryApr 06, 2007 - 1:19 a.m.

CVE-2007-1352

2007-04-0601:19:00
web.nvd.nist.gov

3.8 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:S/C:N/I:P/A:P

7.7 High

AI Score

Confidence

High

0.029 Low

EPSS

Percentile

90.9%

Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.

Affected configurations

NVD
Node
mandrakesoftmandrake_linuxMatch9.1
OR
mandrakesoftmandrake_linuxMatch9.1ppc
OR
mandrakesoftmandrake_linuxMatch9.2
OR
mandrakesoftmandrake_linuxMatch9.2amd64
OR
mandrakesoftmandrake_linuxMatch10.0
OR
mandrakesoftmandrake_linuxMatch10.0amd64
OR
mandrakesoftmandrake_linuxMatch2007
OR
mandrakesoftmandrake_linuxMatch2007x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch4.0
OR
mandrakesoftmandrake_linux_corporate_serverMatch4.0x86_64
AND
mandrakesoftmandrake_multi_network_firewallMatch2.0
Node
x.orglibxfontMatch1.2.2
Node
redhatenterprise_linuxMatch2.1advanced_server
OR
redhatenterprise_linuxMatch2.1advanced_server_ia64
OR
redhatenterprise_linuxMatch2.1enterprise_server
OR
redhatenterprise_linuxMatch2.1enterprise_server_ia64
OR
redhatenterprise_linuxMatch2.1workstation
OR
redhatenterprise_linuxMatch2.1workstation_ia64
OR
redhatenterprise_linuxMatch3.0advanced_server
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation_server
OR
redhatenterprise_linuxMatch4.0advanced_server
OR
redhatenterprise_linuxMatch4.0enterprise_server
OR
redhatenterprise_linuxMatch4.0workstation
OR
redhatenterprise_linux_desktopMatch3.0
OR
redhatenterprise_linux_desktopMatch4.0
OR
redhatenterprise_linux_desktopMatch5.0client
OR
redhatenterprise_linux_desktopMatch5.0client_workstation
OR
redhatfedora_coreMatchcore_1.0
OR
redhatlinuxMatch9.0i386
OR
redhatlinux_advanced_workstationMatch2.1ia64
OR
redhatlinux_advanced_workstationMatch2.1itanium
Node
slackwareslackware_linuxMatch9.0
OR
slackwareslackware_linuxMatch9.1
OR
slackwareslackware_linuxMatchcurrent
Node
turbolinuxturbolinux_desktopMatch10.0
Node
ubuntuubuntu_linuxMatch4.1ia32
OR
ubuntuubuntu_linuxMatch4.1ia64
OR
ubuntuubuntu_linuxMatch4.1ppc
OR
ubuntuubuntu_linuxMatch5.10amd64
OR
ubuntuubuntu_linuxMatch5.10i386
OR
ubuntuubuntu_linuxMatch5.10powerpc
OR
ubuntuubuntu_linuxMatch5.10sparc
OR
ubuntuubuntu_linuxMatch6.06_ltsamd64
OR
ubuntuubuntu_linuxMatch6.06_ltsi386
OR
ubuntuubuntu_linuxMatch6.06_ltspowerpc
OR
ubuntuubuntu_linuxMatch6.06_ltssparc
OR
ubuntuubuntu_linuxMatch6.10amd64
OR
ubuntuubuntu_linuxMatch6.10i386
OR
ubuntuubuntu_linuxMatch6.10powerpc
OR
ubuntuubuntu_linuxMatch6.10sparc
Node
rpathlinuxMatch1
Node
openbsdopenbsdMatch3.9
OR
openbsdopenbsdMatch4.0

References

3.8 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:S/C:N/I:P/A:P

7.7 High

AI Score

Confidence

High

0.029 Low

EPSS

Percentile

90.9%