Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandriva: Updated tightvnc packages fix integer overflow vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Local exploitation of a memory corruption vulnerability in the X.Org and XFree86 X server could allow an attacker to execute arbitrary code with privileges of the X server, typically root.
 Mandriva Linux Security Advisory                       MDKSA-2007:080-1
 Package : tightvnc
 Date    : April 10, 2007
 Affected: 2007.1
 Problem Description:
 Local exploitation of a memory corruption vulnerability in the X.Org
 and XFree86 X server could allow an attacker to execute arbitrary
 code with privileges of the X server, typically root.
 The vulnerability exists in the ProcXCMiscGetXIDList() function in the
 XC-MISC extension. This request is used to determine what resource IDs
 are available for use. This function contains two vulnerabilities,
 both result in memory corruption of either the stack or heap. The
 ALLOCATE_LOCAL() macro used by this function allocates memory on the
 stack using alloca() on systems where alloca() is present, or using
 the heap otherwise. The handler function takes a user provided value,
 multiplies it, and then passes it to the above macro. This results in
 both an integer overflow vulnerability, and an alloca() stack pointer
 shifting vulnerability. Both can be exploited to execute arbitrary
 code. (CVE-2007-1003)
 iDefense reported two integer overflows in the way handled
 various font files. A malicious local user could exploit these issues
 to potentially execute arbitrary code with the privileges of the server. (CVE-2007-1351, CVE-2007-1352)
 TightVNC uses some of the same code base as Xorg, and has the same
 vulnerable code.
 Updated packages are patched to address these issues.


 Packages for Mandriva Linux 2007.1 are now available.

 Updated Packages:
 Mandriva Linux 2007.1:
 9c14a56106984cd16780a1fd7e9c7beb  2007.1/i586/tightvnc-1.2.9-16.1mdv2007.1.i586.rpm
 8aa3673bc8843dae12d9f18c4226214e  2007.1/i586/tightvnc-doc-1.2.9-16.1mdv2007.1.i586.rpm
 d78d10a879bc1b1c461f75b815dcd656  2007.1/i586/tightvnc-server-1.2.9-16.1mdv2007.1.i586.rpm 
 59e94b523bc078f3997f689dae0e22b5  2007.1/SRPMS/tightvnc-1.2.9-16.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 26e585c8ba950720c17ea4ce1373c05c  2007.1/x86_64/tightvnc-1.2.9-16.1mdv2007.1.x86_64.rpm
 6f031ef92c5bec87488bba5861f0d41e  2007.1/x86_64/tightvnc-doc-1.2.9-16.1mdv2007.1.x86_64.rpm
 205e13d0c46dc25bfa39c7dcfafe6dcb  2007.1/x86_64/tightvnc-server-1.2.9-16.1mdv2007.1.x86_64.rpm 
 59e94b523bc078f3997f689dae0e22b5  2007.1/SRPMS/tightvnc-1.2.9-16.1mdv2007.1.src.rpm

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandriva Linux at:

 If you want to report vulnerabilities, please contact


 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.