The X Window System contains an overflow condition in the xfs font server. The issue is triggered as user-supplied input is not properly validated when reading requests from clients. With a specially crafted request, a remote attacker can cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
It has been reported that this issue has been fixed. Upgrade to XFree86 version 4.2 or higher, or X.Org version X11R6.7 or higher, to address this vulnerability. In addition, several vendors have released a patch for their packaged versions.
The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO
warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright
holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.