Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:160: xorg-x11

Vulnerability Assessment Details

MDKSA-2006:160: xorg-x11

Vulnerability Assessment Summary
Check for the version of the xorg-x11 package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:160 (xorg-x11).

X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload,
xtrans, and xterm, does not check the return values for setuid and
seteuid calls when attempting to drop rights, which might permit
local users to gain rights by causing those calls to fail, such as
by exceeding a ulimit.
In practice, it is unlikely that these programs have any real-world
vulnerability. The X binary is the only one shipped suid. Further
analysis of the code in question shows that it's highly unlikely that
this can be exploited. Patched updates are provided as a precaution
Updated packages are patched to address this issue.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Atari 2600 - motheboards
Atari 2600 - motheboards  pictureAtari 800xl
Atari 800xl   pictureAtari 800 computer in working condition Basic Computer Language console keyboard
Atari 800 computer in working condition Basic Computer Language console keyboard pictureAtari 800 Parts: Case, Top & Bottom & LED Light Tube
Atari 800 Parts: Case, Top & Bottom & LED Light Tube picture


No Discussions have been posted on this vulnerability.