openSUSE 安全更新:libX11 (openSUSE-SU-2013:1047-1)

medium Nessus 插件 ID 75052
全新!插件严重性现在使用 CVSS v3

计算的插件严重性默认已更新为使用 CVSS v3。没有 CVSS v3 分数的插件将回退到 CVSS v2 来计算严重性。可以在设置下拉列表中切换严重性显示首选项。

简介

远程 openSUSE 主机缺少安全更新。

描述

libX11 的此更新修复了多个安全问题。

- U_0001-integer-overflow-in-_XQueryFont-on-32-bit-platfor ms-.patch, U_0002-integer-overflow-in-_XF86BigfontQueryFont-CVE-201 3-1.patch, U_0003-integer-overflow-in-XListFontsWithInfo-CVE-2013-1 981.patch, U_0004-integer-overflow-in-XGetMotionEvents-CVE-2013-198 1-4.patch, U_0005-integer-overflow-in-XListHosts-CVE-2013-1981-5-13 .patch, U_0006-Integer-overflows-in-stringSectionSize-cause-buff er-.patch, U_0007-integer-overflow-in-ReadInFile-in-Xrm.c-CVE-2013- 198.patch, U_0008-integer-truncation-in-_XimParseStringFile-CVE-201 3-1.patch, U_0009-integer-overflows-in-TransFileName-CVE-2013-1981- 9-1.patch, U_0010-integer-overflow-in-XGetWindowProperty-CVE-2013-1 981.patch, U_0011-integer-overflow-in-XGetImage-CVE-2013-1981-11-13 .patch, U_0012-integer-overflow-in-XGetPointerMapping-XGetKeyboa rdM.patch, U_0013-integer-overflow-in-XGetModifierMapping-CVE-2013- 198.patch

- 各种函数中的整数溢出,_XimParseStringFile() 中的整数截断 [CVE-2013-1981](bnc#821664、bnc#815451)

- U_0001-unvalidated-lengths-in-XAllocColorCells-CVE-2013- 199.patch, U_0002-unvalidated-index-in-_XkbReadGetDeviceInfoReply-C VE-.patch, U_0003-unvalidated-indexes-in-_XkbReadGeomShapes-CVE-201 3-1.patch, U_0004-unvalidated-indexes-in-_XkbReadGetGeometryReply-C VE-.patch, U_0005-unvalidated-index-in-_XkbReadKeySyms-CVE-2013-199 7-5.patch, U_0006-unvalidated-index-in-_XkbReadKeyActions-CVE-2013- 199.patch, U_0007-unvalidated-index-in-_XkbReadKeyBehaviors-CVE-201 3-1.patch, U_0008-unvalidated-index-in-_XkbReadModifierMap-CVE-2013
-19.patch,U_0009-unvalidated-index-in-_XkbReadExplicitComponents-C VE-.patch,U_0010-unvalidated-index-in-_XkbReadVirtualModMap-CVE-20 13-.patch,U_0011-unvalidated-index-length-in-_XkbReadGetNamesReply
-CV.patch,U_0012-unvalidated-length-in-_XimXGetReadData-CVE-2013-1 997.patch,U_0013-Avoid-overflows-in-XListFonts-CVE-2013-1997-13-15 .patch,U_0014-Avoid-overflows-in-XGetFontPath-CVE-2013-1997-14- 15.patch,U_0015-Avoid-overflows-in-XListExtensions-CVE-2013-1997- 15-.patch

- 各种函数中未验证的索引/长度;避免 XListFonts()、XGetFontPath()、XListExtensions() 中的溢出 [CVE-2013-1997](bnc##821664、bnc#815451)

- U_0001-Unbounded-recursion-in-GetDatabase-when-parsing-i ncl.patch, U_0002-Unbounded-recursion-in-_XimParseStringFile-when-p ars.patch

- GetDatabase() 中无界限的递归,
_XimParseStringFile 在解析时包含文件 [CVE-2013-2004](bnc##821664、bnc#815451)

解决方案

更新受影响的 libX11 程序包。

另见

https://bugzilla.novell.com/show_bug.cgi?id=815451

https://bugzilla.novell.com/show_bug.cgi?id=821664

https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html

插件详情

严重性: Medium

ID: 75052

文件名: openSUSE-2013-516.nasl

版本: 1.7

类型: local

代理: unix

发布时间: 2014/6/13

最近更新时间: 2021/1/19

依存关系: ssh_get_info.nasl

风险信息

VPR

风险因素: Medium

分数: 5.8

CVSS v2

风险因素: Medium

基本分数: 6.8

时间分数: 5

矢量: AV:N/AC:M/Au:N/C:P/I:P/A:P

时间矢量: E:U/RL:OF/RC:C

漏洞信息

CPE: p-cpe:/a:novell:opensuse:libX11-6, p-cpe:/a:novell:opensuse:libX11-6-32bit, p-cpe:/a:novell:opensuse:libX11-6-debuginfo, p-cpe:/a:novell:opensuse:libX11-6-debuginfo-32bit, p-cpe:/a:novell:opensuse:libX11-data, p-cpe:/a:novell:opensuse:libX11-debugsource, p-cpe:/a:novell:opensuse:libX11-devel, p-cpe:/a:novell:opensuse:libX11-devel-32bit, p-cpe:/a:novell:opensuse:libX11-xcb1, p-cpe:/a:novell:opensuse:libX11-xcb1-32bit, p-cpe:/a:novell:opensuse:libX11-xcb1-debuginfo, p-cpe:/a:novell:opensuse:libX11-xcb1-debuginfo-32bit, cpe:/o:novell:opensuse:12.2, cpe:/o:novell:opensuse:12.3

必需的 KB 项: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2013/6/12

参考资料信息

CVE: CVE-2013-1981, CVE-2013-1997, CVE-2013-2004

BID: 60120, 60122, 60146