COMMAND

    X server font path buffer overflow

SYSTEMS AFFECTED

    IRIX

PROBLEM

    A  buffer  overflow  vulnerability  has  been  discovered in the X
    server's font  path which  can lead  to a  root compromise.   An X
    server is  installed by  default on  all IRIX  platforms.  A local
    user account  on the  vulnerable system  is required  in order  to
    exploit X  server font  path.   The buffer  overflow vulnerability
    can lead to a root compromise.

SOLUTION

        OS Version     Vulnerable?     Patch #      Other Actions
        ----------     -----------     -------      -------------
        IRIX 3.x          not tested                Note 1
        IRIX 4.x          not tested                Note 1
        IRIX 5.0-5.2      not tested                Note 1
        IRIX 5.3          yes            3236       Note 1
        IRIX 5.3 IMPACT   yes            3237       Note 1
        IRIX 6.0-6.1      not tested                Note 1
        IRIX 6.2          yes            3238
        IRIX 6.3          yes            3239       Note 2
        IRIX 6.4          yes            3240       Note 2
        IRIX 6.5          yes            6.5.1

    1) Upgrade  to  currently  supported  IRIX operating system.   See
       http://support.sgi.com/news/irix2.html for more information.
    2) This  version of  the IRIX  operating system  is in maintenance
       mode and patches  will no longer  be produced when  it retires.
       See http://support.sgi.com/news/irix1.html for more info.
    3) If  you have  not received  an IRIX  6.5.Xm Maintenance Release
       Stream CD, contact  your SGI Support  Provider or download  the
       IRIX 6.5.X Maintenance Release Stream from support.sgi.com/  or
       ftp://support.sgi.com/support/relstream/