Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-061: XFree


Vulnerability Assessment Details

RHSA-2004-061: XFree

Vulnerability Assessment Summary
Check for the version of the XFree packages

Detailed Explanation for this Vulnerability Assessment


Updated XFree86 packages that fix a privilege escalation vulnerability are
now available.

[Update 16 February 2004]
Erratum filelist has been modified for x86_64 and s390x only so that the
correct multi-lib packages are available.

XFree86 is an implementation of the X Window System, providing the core
graphical user interface and video drivers.

iDefense discovered two buffer overflows in the parsing of the 'font.alias'
file. A local attacker could exploit this vulnerability by creating a
carefully-crafted file and gaining root rights.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2004-0083 and CVE-2004-0084 to these issues.

Additionally David Dawes discovered additional flaws in reading font files.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0106 to these issues.

All users of XFree86 are advised to upgrade to these erratum packages,
which contain a backported fix and are not vulnerable to these issues.

Red Hat would like to thank David Dawes from XFree86 for the patches and
notification of these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2004-061.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco QSFP to 4x SFP 10G 3M Passive 37-1320-02 QSFP-4SFP10G-CU3M "used"
$45.0
Cisco QSFP to 4x SFP 10G 3M Passive 37-1320-02 QSFP-4SFP10G-CU3M New Brocade 8G Fibre channel 8GFC SFP+ SW 8-pack Modules 57-1000117-01
$36.0
New Brocade 8G Fibre channel 8GFC SFP+ SW 8-pack Modules 57-1000117-01 pictureCisco Catalyst WS-C2960-48PST-L V01 100/1000 48 Port PoE+ 4 SFP Uplink Switch
$69.0
Cisco Catalyst WS-C2960-48PST-L V01 100/1000 48 Port PoE+ 4 SFP Uplink Switch pictureLot of 2 PROFICIUM 3M-10GBE-SFP+ 10GbE SFP+ 3 Meters Twinax Copper Cable
$6.1
Lot of 2 PROFICIUM 3M-10GBE-SFP+ 10GbE SFP+ 3 Meters Twinax Copper Cable picture


Discussions

No Discussions have been posted on this vulnerability.