CVE-2007-6427 (CNNVD-200801-299)
CRITICAL
中文标题:
X.Org X Server 缓冲区错误漏洞
英文标题:
The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arb...
CVSS分数:
9.3
发布时间:
2008-01-18 22:00:00
漏洞类型:
缓冲区错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
X.Org X Server是X.Org基金会的一款X Window系统显示服务器。 X.Org X Server 存在安全漏洞,该漏洞所交换的字节数是客户端可控的,且没有经过服务器的正确验证,因此可能导致破坏客户端的请求数据后的堆内存。 攻击者可利用此漏洞控制服务器。
英文描述:
The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.
CWE类型:
CWE-787
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| x.org | x_server | * | - | - |
cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 6.06 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 6.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 7.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 7.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
|
| debian | debian_linux | 3.1 | - | - |
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
|
| debian | debian_linux | 4.0 | - | - |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 7 | - | - |
cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 8 | - | - |
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
|
| opensuse | opensuse | 10.2 | - | - |
cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
|
| opensuse | opensuse | 10.3 | - | - |
cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
|
| suse | linux | 10.1 | - | - |
cpe:2.3:o:suse:linux:10.1:*:*:*:*:*:*:*
|
| suse | linux_enterprise_desktop | 9 | - | - |
cpe:2.3:o:suse:linux_enterprise_desktop:9:*:*:*:*:*:*:*
|
| suse | linux_enterprise_desktop | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 8 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 9 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*
|
| suse | linux_enterprise_software_development_kit | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*
|
| suse | open_enterprise_server | - | - | - |
cpe:2.3:o:suse:open_enterprise_server:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
oval:org.mitre.oval:def:10372
vdb-entry
cve.org
访问
cve.org
28542
third-party-advisory
cve.org
访问
cve.org
29139
third-party-advisory
cve.org
访问
cve.org
27336
vdb-entry
cve.org
访问
cve.org
ADV-2008-0184
vdb-entry
cve.org
访问
cve.org
29622
third-party-advisory
cve.org
访问
cve.org
FEDORA-2008-0831
vendor-advisory
cve.org
访问
cve.org
SUSE-SA:2008:003
vendor-advisory
cve.org
访问
cve.org
SUSE-SR:2008:008
vendor-advisory
cve.org
访问
cve.org
28532
third-party-advisory
cve.org
访问
cve.org
29707
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
28843
third-party-advisory
cve.org
访问
cve.org
DSA-1466
vendor-advisory
cve.org
访问
cve.org
27351
vdb-entry
cve.org
访问
cve.org
28540
third-party-advisory
cve.org
访问
cve.org
SSRT080083
vendor-advisory
cve.org
访问
cve.org
20080130 rPSA-2008-0032-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs
mailing-list
cve.org
访问
cve.org
ADV-2008-0703
vdb-entry
cve.org
访问
cve.org
MDVSA-2008:021
vendor-advisory
cve.org
访问
cve.org
ADV-2008-0924
vdb-entry
cve.org
访问
cve.org
28718
third-party-advisory
cve.org
访问
cve.org
200153
vendor-advisory
cve.org
访问
cve.org
RHSA-2008:0029
vendor-advisory
cve.org
访问
cve.org
28584
third-party-advisory
cve.org
访问
cve.org
[4.1] 20080208 012: SECURITY FIX: February 8, 2008
vendor-advisory
cve.org
访问
cve.org
28941
third-party-advisory
cve.org
访问
cve.org
28592
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
29420
third-party-advisory
cve.org
访问
cve.org
MDVSA-2008:022
vendor-advisory
cve.org
访问
cve.org
APPLE-SA-2008-03-18
vendor-advisory
cve.org
访问
cve.org
30161
third-party-advisory
cve.org
访问
cve.org
GLSA-200805-07
vendor-advisory
cve.org
访问
cve.org
RHSA-2008:0030
vendor-advisory
cve.org
访问
cve.org
28543
third-party-advisory
cve.org
访问
cve.org
28273
third-party-advisory
cve.org
访问
cve.org
RHSA-2008:0031
vendor-advisory
cve.org
访问
cve.org
28550
third-party-advisory
cve.org
访问
cve.org
ADV-2008-0497
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
MDVSA-2008:023
vendor-advisory
cve.org
访问
cve.org
28885
third-party-advisory
cve.org
访问
cve.org
103200
vendor-advisory
cve.org
访问
cve.org
MDVSA-2008:025
vendor-advisory
cve.org
访问
cve.org
USN-571-1
vendor-advisory
cve.org
访问
cve.org
GLSA-200804-05
vendor-advisory
cve.org
访问
cve.org
28535
third-party-advisory
cve.org
访问
cve.org
ADV-2008-3000
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20080117 Multiple Vendor X Server XInput Extension Multiple Memory Corruption Vulnerabilities
third-party-advisory
cve.org
访问
cve.org
[xorg] 20080117 X.Org security advisory: multiple vulnerabilities in the X server
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
32545
third-party-advisory
cve.org
访问
cve.org
xorg-xinput-code-execution(39759)
vdb-entry
cve.org
访问
cve.org
28838
third-party-advisory
cve.org
访问
cve.org
1019232
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
[4.2] 20080208 006: SECURITY FIX: February 8, 2008
vendor-advisory
cve.org
访问
cve.org
28539
third-party-advisory
cve.org
访问
cve.org
SUSE-SR:2008:003
vendor-advisory
cve.org
访问
cve.org
28616
third-party-advisory
cve.org
访问
cve.org
FEDORA-2008-0760
vendor-advisory
cve.org
访问
cve.org
28536
third-party-advisory
cve.org
访问
cve.org
28693
third-party-advisory
cve.org
访问
cve.org
GLSA-200801-09
vendor-advisory
cve.org
访问
cve.org
ADV-2008-0179
vdb-entry
cve.org
访问
cve.org
CVSS评分详情
9.3
CRITICAL
CVSS向量:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本:
2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2008-01-18 22:00:00
修改时间:
2024-08-07 16:02:37
创建时间:
2025-11-11 15:32:48
更新时间:
2025-11-11 15:49:23
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-6427 |
2025-11-11 15:17:57 | 2025-11-11 07:32:48 |
| NVD | nvd_CVE-2007-6427 |
2025-11-11 14:52:13 | 2025-11-11 07:41:35 |
| CNNVD | cnnvd_CNNVD-200801-299 |
2025-11-11 15:09:00 | 2025-11-11 07:49:23 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:23
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-200801-299; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-200801-299
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:35
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 20; references_count: 68 → 67; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 20
- references_count: 68 -> 67
- data_sources: ['cve'] -> ['cve', 'nvd']