gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2001-011.html | broken link patch vendor advisory |
http://www.redhat.com/support/errata/RHSA-2001-010.html | broken link patch vendor advisory |
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-019.php3 | broken link patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6056 | vdb entry third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2001-02/0030.html | mailing list broken link patch vendor advisory |