Korean
<< Back
VID 23043
Severity 40
Port 7101
Protocol TCP
Class X11
Detailed Description The X Font Service for TrueType (xfstt) is running. X Font Server for TrueType (xfstt) is a server for Linux and Unix-based operating systems. xfstt versions 1.4 and earlier are vulnerable to a buffer overflow in xfstt.cc, caused by improper bounds checking of user-supplied input. A remote attacker could use this flaw to execute arbitrary code on the system or to cause the xfstt daemon to crash.

* Note: This check doesn't perform an actually test to assess this vulnerability but solely relied on the presence of xfstt daemon for the remote server, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2003-07/0178.html

* Platforms Affected:
X Font Service for TrueType (xfstt) 1.4 or prior
Debian Linux 3.0
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of xfstt (1.5 or later), available from the Xfstt Developer's Official Web site at http://developer.berlios.de/projects/xfstt

For Debian GNU/Linux 3.0 (woody):
Upgrade to the latest version of xfstt (1.2.1-3 or later), as listed in Debian Security Advisory DSA-360-1 at http://www.debian.org/security/2003/dsa-360

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2003-0581,CVE-2003-0625 (CVE)
Related URL 8182 (SecurityFocus)
Related URL 12655 (ISS)