National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2007-4730 Detail

Description

Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.

Source:  MITRE      Last Modified:  09/11/2007

Quick Info

CVE Dictionary Entry:
CVE-2007-4730
Original release date:
09/11/2007
Last revised:
09/28/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.3 MEDIUM
Vector:
(AV:L/AC:L/Au:S/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
3.1
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Required to exploit
Impact Type:
Provides unauthorized access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (09/26/2007)

This flaw was fixed for Red Hat Enterprise Linux 4 in RHSA-2007-0898: https://rhn.redhat.com/errata/RHSA-2007-0898.html Red Hat Enterprise Linux 5 is not affected by this flaw. More information can be found here: https://bugzilla.redhat.com/show_bug.cgi?id=285991 Red Hat Enterprise Linux 2.1 and 3 do not support the composite extension and are not vulnerable to this flaw.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://bugs.freedesktop.org/show_bug.cgi?id=7447 External Source CONFIRM http://bugs.freedesktop.org/show_bug.cgi?id=7447
http://bugs.gentoo.org/show_bug.cgi?id=191964 External Source CONFIRM http://bugs.gentoo.org/show_bug.cgi?id=191964
http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html External Source MLIST [xorg-announce] 20070906 xorg-server 1.4
http://security.gentoo.org/glsa/glsa-200710-16.xml External Source GENTOO GLSA-200710-16
http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm External Source CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187 External Source CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187
http://www.debian.org/security/2007/dsa-1372 Patch External Source DEBIAN DSA-1372
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml External Source GENTOO GLSA-200805-07
http://www.mandriva.com/security/advisories?name=MDKSA-2007:178 External Source MANDRIVA MDKSA-2007:178
http://www.mandriva.com/security/advisories?name=MDVSA-2008:022 External Source MANDRIVA MDVSA-2008:022
http://www.novell.com/linux/security/advisories/2007_54_xorg.html External Source SUSE SUSE-SA:2007:054
http://www.redhat.com/support/errata/RHSA-2007-0898.html External Source REDHAT RHSA-2007:0898
http://www.securityfocus.com/bid/25606 External Source BID 25606
http://www.securitytracker.com/id?1018665 External Source SECTRACK 1018665
http://www.ubuntu.com/usn/usn-514-1 External Source UBUNTU USN-514-1
http://www.vupen.com/english/advisories/2007/3098 External Source VUPEN ADV-2007-3098
https://exchange.xforce.ibmcloud.com/vulnerabilities/36535 External Source XF xorg-composite-bo(36535)
https://issues.rpath.com/browse/RPL-1728 External Source CONFIRM https://issues.rpath.com/browse/RPL-1728
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430 External Source OVAL oval:org.mitre.oval:def:10430

References to Check Content

Identifier:
oval:org.mitre.oval:def:10430
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:10430

Technical Details

Vulnerability Type (View All)

Change History 4 change records found - show changes