Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2007-0002: XFree

Vulnerability Assessment Details

RHSA-2007-0002: XFree

Vulnerability Assessment Summary
Check for the version of the XFree packages

Detailed Explanation for this Vulnerability Assessment

Updated XFree86 packages that fix a security issue are now available for Red
Hat Enterprise Linux 2.1 and 3.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

XFree86 is an implementation of the X Window System, which provides the
core functionality for the Linux graphical desktop.

iDefense reported three integer overflow flaws in the XFree86 Render and
DBE extensions. A malicious authorized client could exploit this issue to
cause a denial of service (crash) or potentially execute arbitrary code
with root rights on the XFree86 server. (CVE-2006-6101, CVE-2006-6102,

Users of XFree86 should upgrade to these updated packages, which contain a
backported patch and is not vulnerable to this issue.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Vintage Commodore C2N cassette player
 Vintage Commodore  C2N  cassette player  pictureAMIGA 520 VIDEO ADAPTER (NTSC)
AMIGA 520 VIDEO ADAPTER (NTSC) pictureCommodore 64 128 X-Men video game diskettes
Commodore 64 128 X-Men video game diskettes pictureCommodore AMIGA 1200 BLIZZARD 1200/4 Memory Board 4MB fast,low sn,as new,tested
Commodore AMIGA 1200 BLIZZARD 1200/4 Memory Board  4MB fast,low sn,as new,tested picture


No Discussions have been posted on this vulnerability.