Short Name |
HTTP:STC:X11-OVERSIZE-FONT |
---|---|
Severity |
Low |
Recommended |
No |
Category |
HTTP |
Keywords |
X11 font dos |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Xfree86. Versions 4.3.0 and prior are vulnerable. Attackers can submit an oversize font (Ex. via a style-sheet) to an X11 server to cause Xfree86 to consume exorbitant amounts of memory.
X Window System behaves unpredictably when handling an overly large font size. If an attacker can pass an overly large font size to X Window System, it is possible to cause a denial of service condition. Remote exploitation of this issue is possible via web clients or other applications which do not check that the font size is sane before passing it to the X Window System. This is reported to be a problem with xfs (X Font Server) and the libXfont component. This is reported to affect various X Window System implementations, including XFree86.