CVE-2007-4730 (GCVE-0-2007-4730)
Vulnerability from cvelistv5
Published
2007-09-11 19:00
Modified
2024-08-07 15:08
Severity ?
CWE
  • n/a
Summary
Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.
References
http://www.novell.com/linux/security/advisories/2007_54_xorg.html vendor-advisory, x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDKSA-2007:178 vendor-advisory, x_refsource_MANDRIVA
http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html mailing-list, x_refsource_MLIST
http://osvdb.org/37726 vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/26823 third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1728 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200710-16.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/26859 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27147 third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0898.html vendor-advisory, x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDVSA-2008:022 vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/25606 vdb-entry, x_refsource_BID
http://www.ubuntu.com/usn/usn-514-1 vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/26743 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27228 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30161 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/36535 vdb-entry, x_refsource_XF
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml vendor-advisory, x_refsource_GENTOO
http://www.securitytracker.com/id?1018665 vdb-entry, x_refsource_SECTRACK
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187 x_refsource_CONFIRM
http://secunia.com/advisories/26897 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26755 third-party-advisory, x_refsource_SECUNIA
http://bugs.freedesktop.org/show_bug.cgi?id=7447 x_refsource_CONFIRM
http://secunia.com/advisories/26763 third-party-advisory, x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430 vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/27179 third-party-advisory, x_refsource_SECUNIA
http://bugs.gentoo.org/show_bug.cgi?id=191964 x_refsource_CONFIRM
http://www.debian.org/security/2007/dsa-1372 vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2007/3098 vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:08:33.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SA:2007:054",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_54_xorg.html"
          },
          {
            "name": "MDKSA-2007:178",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:178"
          },
          {
            "name": "[xorg-announce] 20070906 xorg-server 1.4",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html"
          },
          {
            "name": "37726",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37726"
          },
          {
            "name": "26823",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26823"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1728"
          },
          {
            "name": "GLSA-200710-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200710-16.xml"
          },
          {
            "name": "26859",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26859"
          },
          {
            "name": "27147",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27147"
          },
          {
            "name": "RHSA-2007:0898",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0898.html"
          },
          {
            "name": "MDVSA-2008:022",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:022"
          },
          {
            "name": "25606",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25606"
          },
          {
            "name": "USN-514-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-514-1"
          },
          {
            "name": "26743",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26743"
          },
          {
            "name": "27228",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27228"
          },
          {
            "name": "30161",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30161"
          },
          {
            "name": "xorg-composite-bo(36535)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36535"
          },
          {
            "name": "GLSA-200805-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
          },
          {
            "name": "1018665",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018665"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187"
          },
          {
            "name": "26897",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26897"
          },
          {
            "name": "26755",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26755"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.freedesktop.org/show_bug.cgi?id=7447"
          },
          {
            "name": "26763",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26763"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm"
          },
          {
            "name": "oval:org.mitre.oval:def:10430",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430"
          },
          {
            "name": "27179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=191964"
          },
          {
            "name": "DSA-1372",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1372"
          },
          {
            "name": "ADV-2007-3098",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3098"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-06T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SA:2007:054",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_54_xorg.html"
        },
        {
          "name": "MDKSA-2007:178",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:178"
        },
        {
          "name": "[xorg-announce] 20070906 xorg-server 1.4",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html"
        },
        {
          "name": "37726",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37726"
        },
        {
          "name": "26823",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26823"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1728"
        },
        {
          "name": "GLSA-200710-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200710-16.xml"
        },
        {
          "name": "26859",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26859"
        },
        {
          "name": "27147",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27147"
        },
        {
          "name": "RHSA-2007:0898",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0898.html"
        },
        {
          "name": "MDVSA-2008:022",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:022"
        },
        {
          "name": "25606",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25606"
        },
        {
          "name": "USN-514-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-514-1"
        },
        {
          "name": "26743",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26743"
        },
        {
          "name": "27228",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27228"
        },
        {
          "name": "30161",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30161"
        },
        {
          "name": "xorg-composite-bo(36535)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36535"
        },
        {
          "name": "GLSA-200805-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
        },
        {
          "name": "1018665",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018665"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187"
        },
        {
          "name": "26897",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26897"
        },
        {
          "name": "26755",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26755"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.freedesktop.org/show_bug.cgi?id=7447"
        },
        {
          "name": "26763",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26763"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm"
        },
        {
          "name": "oval:org.mitre.oval:def:10430",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430"
        },
        {
          "name": "27179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=191964"
        },
        {
          "name": "DSA-1372",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1372"
        },
        {
          "name": "ADV-2007-3098",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3098"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4730",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SA:2007:054",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_54_xorg.html"
            },
            {
              "name": "MDKSA-2007:178",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:178"
            },
            {
              "name": "[xorg-announce] 20070906 xorg-server 1.4",
              "refsource": "MLIST",
              "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-September/000378.html"
            },
            {
              "name": "37726",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37726"
            },
            {
              "name": "26823",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26823"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1728",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1728"
            },
            {
              "name": "GLSA-200710-16",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200710-16.xml"
            },
            {
              "name": "26859",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26859"
            },
            {
              "name": "27147",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27147"
            },
            {
              "name": "RHSA-2007:0898",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0898.html"
            },
            {
              "name": "MDVSA-2008:022",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:022"
            },
            {
              "name": "25606",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25606"
            },
            {
              "name": "USN-514-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-514-1"
            },
            {
              "name": "26743",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26743"
            },
            {
              "name": "27228",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27228"
            },
            {
              "name": "30161",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30161"
            },
            {
              "name": "xorg-composite-bo(36535)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36535"
            },
            {
              "name": "GLSA-200805-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
            },
            {
              "name": "1018665",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018665"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0187"
            },
            {
              "name": "26897",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26897"
            },
            {
              "name": "26755",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26755"
            },
            {
              "name": "http://bugs.freedesktop.org/show_bug.cgi?id=7447",
              "refsource": "CONFIRM",
              "url": "http://bugs.freedesktop.org/show_bug.cgi?id=7447"
            },
            {
              "name": "26763",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26763"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-394.htm"
            },
            {
              "name": "oval:org.mitre.oval:def:10430",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10430"
            },
            {
              "name": "27179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27179"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=191964",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=191964"
            },
            {
              "name": "DSA-1372",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1372"
            },
            {
              "name": "ADV-2007-3098",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3098"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4730",
    "datePublished": "2007-09-11T19:00:00.000Z",
    "dateReserved": "2007-09-05T00:00:00.000Z",
    "dateUpdated": "2024-08-07T15:08:33.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…