Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:74586
[Eng]
Version
2
Class
vulnerability
ALTXid
245395
Language
Russian
Severity
Critical
Title
SLES/SLED -- уязвимость в xorg-x11, libpciaccess0, ft2demos (CVE-2011-2895)
Description
В продуктах xorg-x11, libpciaccess0, ft2demos обнаружена уязвимость CVE-2011-2895.
Family
unix
Platform
SUSE Linux Enterprise Desktop 10 SP4
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 10 SP2
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Server 11 SP1
Product
ft2demos
libpciaccess0
xorg-x11
Reference
FSTEC: BDU:2015-09705
FSTEC: BDU:2015-09705
Id:
BDU:2015-09705
Reference:
https://bdu.fstec.ru/vul/2015-09705
FSTEC: BDU:2015-08768
FSTEC: BDU:2015-08768
Id:
BDU:2015-08768
Reference:
https://bdu.fstec.ru/vul/2015-08768
FSTEC: BDU:2015-08767
FSTEC: BDU:2015-08767
Id:
BDU:2015-08767
Reference:
https://bdu.fstec.ru/vul/2015-08767
FSTEC: BDU:2015-08766
FSTEC: BDU:2015-08766
Id:
BDU:2015-08766
Reference:
https://bdu.fstec.ru/vul/2015-08766
FSTEC: BDU:2015-08765
FSTEC: BDU:2015-08765
Id:
BDU:2015-08765
Reference:
https://bdu.fstec.ru/vul/2015-08765
FSTEC: BDU:2015-08764
FSTEC: BDU:2015-08764
Id:
BDU:2015-08764
Reference:
https://bdu.fstec.ru/vul/2015-08764
FSTEC: BDU:2015-07407
FSTEC: BDU:2015-07407
Id:
BDU:2015-07407
Reference:
https://bdu.fstec.ru/vul/2015-07407
FSTEC: BDU:2015-07406
FSTEC: BDU:2015-07406
Id:
BDU:2015-07406
Reference:
https://bdu.fstec.ru/vul/2015-07406
FSTEC: BDU:2015-07405
FSTEC: BDU:2015-07405
Id:
BDU:2015-07405
Reference:
https://bdu.fstec.ru/vul/2015-07405
FSTEC: BDU:2015-07404
FSTEC: BDU:2015-07404
Id:
BDU:2015-07404
Reference:
https://bdu.fstec.ru/vul/2015-07404
FSTEC: BDU:2015-07403
FSTEC: BDU:2015-07403
Id:
BDU:2015-07403
Reference:
https://bdu.fstec.ru/vul/2015-07403
FSTEC: BDU:2015-05380
FSTEC: BDU:2015-05380
Id:
BDU:2015-05380
Reference:
https://bdu.fstec.ru/vul/2015-05380
FSTEC: BDU:2015-05379
FSTEC: BDU:2015-05379
Id:
BDU:2015-05379
Reference:
https://bdu.fstec.ru/vul/2015-05379
FSTEC: BDU:2015-05378
FSTEC: BDU:2015-05378
Id:
BDU:2015-05378
Reference:
https://bdu.fstec.ru/vul/2015-05378
FSTEC: BDU:2015-05377
FSTEC: BDU:2015-05377
Id:
BDU:2015-05377
Reference:
https://bdu.fstec.ru/vul/2015-05377
FSTEC: BDU:2015-05376
FSTEC: BDU:2015-05376
Id:
BDU:2015-05376
Reference:
https://bdu.fstec.ru/vul/2015-05376
FSTEC: BDU:2015-05375
FSTEC: BDU:2015-05375
Id:
BDU:2015-05375
Reference:
https://bdu.fstec.ru/vul/2015-05375
FSTEC: BDU:2015-05374
FSTEC: BDU:2015-05374
Id:
BDU:2015-05374
Reference:
https://bdu.fstec.ru/vul/2015-05374
FSTEC: BDU:2015-04573
FSTEC: BDU:2015-04573
Id:
BDU:2015-04573
Reference:
https://bdu.fstec.ru/vul/2015-04573
FSTEC: BDU:2015-04572
FSTEC: BDU:2015-04572
Id:
BDU:2015-04572
Reference:
https://bdu.fstec.ru/vul/2015-04572
FSTEC: BDU:2015-04571
FSTEC: BDU:2015-04571
Id:
BDU:2015-04571
Reference:
https://bdu.fstec.ru/vul/2015-04571
FSTEC: BDU:2015-04570
FSTEC: BDU:2015-04570
Id:
BDU:2015-04570
Reference:
https://bdu.fstec.ru/vul/2015-04570
FSTEC: BDU:2015-03486
FSTEC: BDU:2015-03486
Id:
BDU:2015-03486
Reference:
https://bdu.fstec.ru/vul/2015-03486
CVE: CVE-2011-2895
CVE: CVE-2011-2895
Id:
CVE-2011-2895
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895
Comment
: The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
USN-1191-1 (UBUNTU)
[xorg-announce] 20110810 X.Org security advisory: libXfont LZW decompression heap corruption (MLIST)
http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=725760 (CONFIRM)
RHSA-2011:1155 (REDHAT)
45568 (SECUNIA)
[oss-security] 20110810 LZW decompression issues (MLIST)
1025920 (SECTRACK)
DSA-2293 (DEBIAN)
45544 (SECUNIA)
RHSA-2011:1154 (REDHAT)
49124 (BID)
45599 (SECUNIA)
https://bugzilla.redhat.com/show_bug.cgi?id=727624 (CONFIRM)
[xorg-announce] 20110810 [ANNOUNCE] libXfont 1.4.4 (MLIST)
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/compress/zopen.c#rev1.17 (CONFIRM)
RHSA-2011:1161 (REDHAT)
45986 (SECUNIA)
SUSE-SU-2011:1035 (SUSE)
46127 (SECUNIA)
NetBSD-SA2011-007 (NETBSD)
MDVSA-2011:153 (MANDRIVA)
openSUSE-SU-2011:1299 (SUSE)
RHSA-2011:1834 (REDHAT)
APPLE-SA-2012-02-01-1 (APPLE)
http://support.apple.com/kb/HT5130 (CONFIRM)
http://support.apple.com/kb/HT5281 (CONFIRM)
APPLE-SA-2012-05-09-1 (APPLE)
48951 (SECUNIA)
https://support.apple.com/HT205635 (CONFIRM)
APPLE-SA-2015-12-08-3 (APPLE)
https://support.apple.com/HT205637 (CONFIRM)
APPLE-SA-2015-12-08-4 (APPLE)
APPLE-SA-2015-12-08-1 (APPLE)
https://support.apple.com/HT205641 (CONFIRM)
APPLE-SA-2015-12-08-2 (APPLE)
https://support.apple.com/HT205640 (CONFIRM)
xorg-lzw-bo(69141) (XF)
VENDOR: SUSE-SU-2011:1035-2
VENDOR: SUSE-SU-2011:1035-2
Id:
SUSE-SU-2011:1035-2
Reference:
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00006.html
VENDOR: SUSE-SU-2011:1035-1
VENDOR: SUSE-SU-2011:1035-1
Id:
SUSE-SU-2011:1035-1
Reference:
http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00019.html
VENDOR: SUSE-SU-2012:0553-1
VENDOR: SUSE-SU-2012:0553-1
Id:
SUSE-SU-2012:0553-1
Reference:
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html
Content available only for registered users!
ovaldb@altx-soft.com