CVE-2007-6427 (CNNVD-200801-299)

CRITICAL
中文标题:
X.Org X Server 缓冲区错误漏洞
英文标题:
The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arb...
CVSS分数: 9.3
发布时间: 2008-01-18 22:00:00
漏洞类型: 缓冲区错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

X.Org X Server是X.Org基金会的一款X Window系统显示服务器。 X.Org X Server 存在安全漏洞,该漏洞所交换的字节数是客户端可控的,且没有经过服务器的正确验证,因此可能导致破坏客户端的请求数据后的堆内存。 攻击者可利用此漏洞控制服务器。

英文描述:

The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.

CWE类型:
CWE-787
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
x.org x_server * - - cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
canonical ubuntu_linux 6.06 - - cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
canonical ubuntu_linux 6.10 - - cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
canonical ubuntu_linux 7.04 - - cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
canonical ubuntu_linux 7.10 - - cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
debian debian_linux 3.1 - - cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
debian debian_linux 4.0 - - cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
apple mac_os_x * - - cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
fedoraproject fedora 7 - - cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
fedoraproject fedora 8 - - cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
opensuse opensuse 10.2 - - cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
opensuse opensuse 10.3 - - cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
suse linux 10.1 - - cpe:2.3:o:suse:linux:10.1:*:*:*:*:*:*:*
suse linux_enterprise_desktop 9 - - cpe:2.3:o:suse:linux_enterprise_desktop:9:*:*:*:*:*:*:*
suse linux_enterprise_desktop 10 - - cpe:2.3:o:suse:linux_enterprise_desktop:10:-:*:*:*:*:*:*
suse linux_enterprise_server 8 - - cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
suse linux_enterprise_server 9 - - cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
suse linux_enterprise_server 10 - - cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*
suse linux_enterprise_software_development_kit 10 - - cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*
suse open_enterprise_server - - - cpe:2.3:o:suse:open_enterprise_server:-:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
oval:org.mitre.oval:def:10372 vdb-entry
cve.org
访问
28542 third-party-advisory
cve.org
访问
29139 third-party-advisory
cve.org
访问
27336 vdb-entry
cve.org
访问
ADV-2008-0184 vdb-entry
cve.org
访问
29622 third-party-advisory
cve.org
访问
FEDORA-2008-0831 vendor-advisory
cve.org
访问
SUSE-SA:2008:003 vendor-advisory
cve.org
访问
SUSE-SR:2008:008 vendor-advisory
cve.org
访问
28532 third-party-advisory
cve.org
访问
29707 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
28843 third-party-advisory
cve.org
访问
DSA-1466 vendor-advisory
cve.org
访问
27351 vdb-entry
cve.org
访问
28540 third-party-advisory
cve.org
访问
SSRT080083 vendor-advisory
cve.org
访问
20080130 rPSA-2008-0032-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs mailing-list
cve.org
访问
ADV-2008-0703 vdb-entry
cve.org
访问
MDVSA-2008:021 vendor-advisory
cve.org
访问
ADV-2008-0924 vdb-entry
cve.org
访问
28718 third-party-advisory
cve.org
访问
200153 vendor-advisory
cve.org
访问
RHSA-2008:0029 vendor-advisory
cve.org
访问
28584 third-party-advisory
cve.org
访问
[4.1] 20080208 012: SECURITY FIX: February 8, 2008 vendor-advisory
cve.org
访问
28941 third-party-advisory
cve.org
访问
28592 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
29420 third-party-advisory
cve.org
访问
MDVSA-2008:022 vendor-advisory
cve.org
访问
APPLE-SA-2008-03-18 vendor-advisory
cve.org
访问
30161 third-party-advisory
cve.org
访问
GLSA-200805-07 vendor-advisory
cve.org
访问
RHSA-2008:0030 vendor-advisory
cve.org
访问
28543 third-party-advisory
cve.org
访问
28273 third-party-advisory
cve.org
访问
RHSA-2008:0031 vendor-advisory
cve.org
访问
28550 third-party-advisory
cve.org
访问
ADV-2008-0497 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
MDVSA-2008:023 vendor-advisory
cve.org
访问
28885 third-party-advisory
cve.org
访问
103200 vendor-advisory
cve.org
访问
MDVSA-2008:025 vendor-advisory
cve.org
访问
USN-571-1 vendor-advisory
cve.org
访问
GLSA-200804-05 vendor-advisory
cve.org
访问
28535 third-party-advisory
cve.org
访问
ADV-2008-3000 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20080117 Multiple Vendor X Server XInput Extension Multiple Memory Corruption Vulnerabilities third-party-advisory
cve.org
访问
[xorg] 20080117 X.Org security advisory: multiple vulnerabilities in the X server mailing-list
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
32545 third-party-advisory
cve.org
访问
xorg-xinput-code-execution(39759) vdb-entry
cve.org
访问
28838 third-party-advisory
cve.org
访问
1019232 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
[4.2] 20080208 006: SECURITY FIX: February 8, 2008 vendor-advisory
cve.org
访问
28539 third-party-advisory
cve.org
访问
SUSE-SR:2008:003 vendor-advisory
cve.org
访问
28616 third-party-advisory
cve.org
访问
FEDORA-2008-0760 vendor-advisory
cve.org
访问
28536 third-party-advisory
cve.org
访问
28693 third-party-advisory
cve.org
访问
GLSA-200801-09 vendor-advisory
cve.org
访问
ADV-2008-0179 vdb-entry
cve.org
访问
CVSS评分详情
9.3
CRITICAL
CVSS向量: AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2008-01-18 22:00:00
修改时间:
2024-08-07 16:02:37
创建时间:
2025-11-11 15:32:48
更新时间:
2025-11-11 15:49:23
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2007-6427 2025-11-11 15:17:57 2025-11-11 07:32:48
NVD nvd_CVE-2007-6427 2025-11-11 14:52:13 2025-11-11 07:41:35
CNNVD cnnvd_CNNVD-200801-299 2025-11-11 15:09:00 2025-11-11 07:49:23
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:23
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-200801-299; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 缓冲区错误
  • cnnvd_id: 未提取 -> CNNVD-200801-299
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:35
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 20; references_count: 68 → 67; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 20
  • references_count: 68 -> 67
  • data_sources: ['cve'] -> ['cve', 'nvd']