ID CVE-2007-2437
Summary The X render (Xrender) extension in X.org X Window System 7.0, 7.1, and 7.2, with Xserver 1.3.0 and earlier, allows remote authenticated users to cause a denial of service (daemon crash) via crafted values to the (1) XRenderCompositeTrapezoids and (2) XRenderAddTraps functions, which trigger a divide-by-zero error.
References
Vulnerable Configurations
  • cpe:2.3:a:x.org:x_window_system:7.0
    cpe:2.3:a:x.org:x_window_system:7.0
  • cpe:2.3:a:x.org:x_window_system:7.1
    cpe:2.3:a:x.org:x_window_system:7.1
  • cpe:2.3:a:x.org:x_window_system:7.2
    cpe:2.3:a:x.org:x_window_system:7.2
  • cpe:2.3:a:x.org:xserver:1.3.0
    cpe:2.3:a:x.org:xserver:1.3.0
CVSS
Base: 5.5 (as of 02-05-2007 - 15:39)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW SINGLE_INSTANCE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
exploit-db via4
description X.Org X Window System Xserver 1.3 XRender Extension Divide by Zero Denial of Service Vulnerability. CVE-2007-2437. Dos exploit for linux platform
id EDB-ID:29939
last seen 2016-02-03
modified 2007-05-01
published 2007-05-01
reporter Derek Abdine
source https://www.exploit-db.com/download/29939/
title X.Org X Window System Xserver 1.3 XRender Extension Divide by Zero Denial of Service Vulnerability
nessus via4
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_125720-68.NASL
    description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Mar/09/17
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107939
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107939
    title Solaris 10 (x86) : 125720-68
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_125720-59.NASL
    description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Sep/12/13
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107935
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107935
    title Solaris 10 (x86) : 125720-59
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_125720-66.NASL
    description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Jul/13/15
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107937
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107937
    title Solaris 10 (x86) : 125720-66
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_125720-67.NASL
    description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Nov/12/15
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107938
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107938
    title Solaris 10 (x86) : 125720-67
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_125720-65.NASL
    description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Oct/13/14
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107936
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107936
    title Solaris 10 (x86) : 125720-65
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_125720.NASL
    description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Aug/23/17 This plugin has been deprecated and either replaced with individual 125720 patch-revision plugins, or deemed non-security related.
    last seen 2019-02-21
    modified 2018-07-30
    plugin id 25395
    published 2007-06-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=25395
    title Solaris 10 (x86) : 125720-70 (deprecated)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201301-01.NASL
    description The remote host is affected by the vulnerability described in GLSA-201301-01 (Mozilla Products: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL’s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser’s font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-11-19
    plugin id 63402
    published 2013-01-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63402
    title GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)
refmap via4
bid 23741
misc http://www.rapid7.com/advisories/R7-0027.jsp
osvdb 34905
sectrack 1017984
secunia 25121
sunalert
  • 102901
  • 200067
vupen
  • ADV-2007-1601
  • ADV-2007-1658
xf xorg-xrender-dos(33976)
statements via4
contributor Joshua Bressers
lastmodified 2007-05-25
organization Red Hat
statement Red Hat does not consider a user assisted client crash such as this to be a security flaw.
Last major update 07-03-2011 - 21:54
Published 02-05-2007 - 06:19
Last modified 28-07-2017 - 21:31
Back to Top