Bug 204052 - vncserver PCF handling Integer overflow
Summary: vncserver PCF handling Integer overflow
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: vnc
Version: 6
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Adam Tkac
QA Contact: David Lawrence
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-08-25 10:12 UTC by Mark J. Cox
Modified: 2013-04-30 23:34 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2006-10-25 09:58:28 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Mark J. Cox 2006-08-25 10:12:23 UTC
For FC6 test 2

+++ This bug was initially created as a clone of Bug #202469 +++

An integer overflow was discovered in the way freetype processes malformed PCF
files.  It seems that Xorg also contains the same PCF processing code as
freetype, there it too is vulnerable this issue.

We initally described this issue for freetype in bug 190593.

The upstream bug is here:
https://bugs.freedesktop.org/show_bug.cgi?id=7535

-- Additional comment from bressers on 2006-08-14 14:09 EST --
The upstream patch is attachment 134155 [details]


-- Additional comment from bressers on 2006-08-15 20:42 EST --
Created an attachment (id=134276)
Demo font file


This issue also affects the vncserver shipped with RHEL2.1 and RHEL3

-- Additional comment from mgrac on 2006-08-23 08:13 EST --
Affected code is not in the VNC package

-- Additional comment from bressers on 2006-08-23 08:35 EST --
I can make the vnc server crash by using the demo font file.

Differnt issue perhaps?

-- Additional comment from mgrac on 2006-08-24 10:06 EST --
My fault, there were two files with same name and I have checked just one of
them.   After applying proposed patch the vncserver works correctly (xfontsel
crashes).

Comment 1 Josh Bressers 2006-08-25 18:48:24 UTC
I've done some thinking about this and I'm removing the Security keyword.  There
is no way this can be considered a security issue, it's simply a bug.

The only way this is exploitable is if a bad font can be included in the
vncserver font path.  That means that an attacker already has access to the
account in question.

Comment 2 Adam Tkac 2006-10-25 09:58:28 UTC
vncserver up to FC-5 uses different xorg-server which isn't affected by this bug


Note You need to log in before you can comment on or make changes to this bug.