SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Exceed Vendors:   Hummingbird Ltd.
Hummingbird Exceed Font Processing Bug May Let Remote Authenticated Users Execute Arbitrary Code
SecurityTracker Alert ID:  1007200
SecurityTracker URL:  http://securitytracker.com/id/1007200
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 15 2003
Impact:   Denial of service via local system, Denial of service via network, Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  

Description:   A vulnerability was reported in Hummingbird's Exceed communications software in the processing of fonts. A user can cause denial of service conditions and may be able to execute arbitrary code.

c0ntex posted an exploit to Packetstorm, indicating that a remote user can create a specially crafted font string to trigger a buffer overflow. A local user can crash the Exceed server. A remote authenticated user can also crash the server. A remote user acting as an X Font Server can cause a connected target user's Exceed client to crash. It is also reported that the X Font Server can overwrite the ESI and EIP registers with arbitrary values and may be able to execute arbitrary code on the target system.

The demonstration exploit is available at:

http://packetstorm.linuxsecurity.com/0307-exploits/exceed.c

The vendor has reportedly been notified without response.

Impact:   A local user can cause the local Exceed server to crash.

A remote authenticated user can cause the target server to crash.

A remote user acting as an X Font Server can cause a connected Exceed client to crash and potentially execute arbitrary code.

Solution:   No solution was available at the time of this entry.
Vendor URL:  www.hummingbird.com/products/nc/exceed/index.html?cks=y (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC