Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200608-25] X.org and some X.org libraries: Local privilege escalations


Vulnerability Assessment Details

[GLSA-200608-25] X.org and some X.org libraries: Local privilege escalations

Vulnerability Assessment Summary
X.org and some X.org libraries: Local privilege escalations

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200608-25
(X.org and some X.org libraries: Local privilege escalations)


Several X.org libraries and X.org itself contain system calls to
set*uid() functions, without checking their result.

Impact

Local users could deliberately exceed their assigned resource limits
and elevate their rights after an unsuccessful set*uid() system
call. This requires resource limits to be enabled on the machine.

Workaround

There is no known workaround at this time.

References:
http://lists.freedesktop.org/archives/xorg/2006-June/016146.html


Solution:
All X.Org xdm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-apps/xdm-1.0.4-r1"
All X.Org xinit users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-apps/xinit-1.0.2-r6"
All X.Org xload users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-apps/xload-1.0.1-r1"
All X.Org xf86dga users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-apps/xf86dga-1.0.1-r1"
All X.Org users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.9.0-r2"
All X.Org X servers users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.1.0-r1"
All X.Org X11 library users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libX11-1.0.1-r1"
All X.Org xtrans library users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/xtrans-1.0.1-r1"
All xterm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-terms/xterm-215"
All users of the X11R6 libraries for emulation of 32bit x86 on amd64
should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-xlibs-7.0-r2"
Please note that the fixed packages have been available for most
architectures since June 30th but the GLSA release was held up waiting
for the remaining architectures.


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

Cisco WS-C3750G-48PS-S Power Supply 341-0108-02 DPSN-550AP Tested Working
$39.99
Cisco WS-C3750G-48PS-S Power Supply 341-0108-02 DPSN-550AP Tested Working pictureLOT of 10x D-Link DEM-311GT Compatible 1000base-SX SFP
$136.42
LOT of 10x D-Link DEM-311GT Compatible 1000base-SX SFP pictureLinksys MGBSX1 Compatible 1000base-SX SFP, SFP SX, remis à neuf
$19.75
Linksys MGBSX1 Compatible 1000base-SX SFP, SFP SX, remis à neuf pictureCisco SF500-24P 24-Port 10/100 PoE Stackable Managed Switch
$63.99
Cisco SF500-24P 24-Port 10/100 PoE Stackable Managed Switch picture


Discussions

No Discussions have been posted on this vulnerability.