COMMAND
X server font path buffer overflow
SYSTEMS AFFECTED
IRIX
PROBLEM
A buffer overflow vulnerability has been discovered in the X
server's font path which can lead to a root compromise. An X
server is installed by default on all IRIX platforms. A local
user account on the vulnerable system is required in order to
exploit X server font path. The buffer overflow vulnerability
can lead to a root compromise.
SOLUTION
OS Version Vulnerable? Patch # Other Actions
---------- ----------- ------- -------------
IRIX 3.x not tested Note 1
IRIX 4.x not tested Note 1
IRIX 5.0-5.2 not tested Note 1
IRIX 5.3 yes 3236 Note 1
IRIX 5.3 IMPACT yes 3237 Note 1
IRIX 6.0-6.1 not tested Note 1
IRIX 6.2 yes 3238
IRIX 6.3 yes 3239 Note 2
IRIX 6.4 yes 3240 Note 2
IRIX 6.5 yes 6.5.1
1) Upgrade to currently supported IRIX operating system. See
http://support.sgi.com/news/irix2.html for more information.
2) This version of the IRIX operating system is in maintenance
mode and patches will no longer be produced when it retires.
See http://support.sgi.com/news/irix1.html for more info.
3) If you have not received an IRIX 6.5.Xm Maintenance Release
Stream CD, contact your SGI Support Provider or download the
IRIX 6.5.X Maintenance Release Stream from support.sgi.com/ or
ftp://support.sgi.com/support/relstream/