|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-478: XFree Vulnerability Assessment Details
|
RHSA-2004-478: XFree |
||
Check for the version of the XFree packages Detailed Explanation for this Vulnerability Assessment Updated XFree86 packages that fix several security flaws in libXpm, as well as other bugs, are now available for Red Hat Enterprise Linux 3. XFree86 is an open source implementation of the X Window System. It provides the basic low level functionality which full fledged graphical user interfaces (GUIs) such as GNOME and KDE are designed upon. During a source code audit, Chris Evans discovered several stack overflow flaws and an integer overflow flaw in the X.Org libXpm library used to decode XPM (X PixMap) images. A possible hacker could create a carefully crafted XPM file which would cause an application to crash or potentially execute arbitrary code if opened by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-0687, CVE-2004-0688, and CVE-2004-0692 to these issues. A flaw was found in the X Display Manager (XDM). XDM is shipped with Red Hat Enterprise Linux, but is not used by default. XDM opened a chooserFd TCP socket even if the DisplayManager.requestPort parameter was set to 0. This permited authorized users to access a machine remotely via X, even if the administrator had configured XDM to refuse such connections. Although XFree86 4.3.0 was not vulnerable to this issue, Red Hat Enterprise Linux 3 contained a backported patch which introduced this flaw. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0419 to this issue. Users are advised to upgrade to these erratum packages, which contain backported security patches to correct these and a number of other issues. Solution : http://rhn.redhat.com/errata/RHSA-2004-478.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
OEM 130W Charger For Dell XPS 15 9530 9550 9560 9570 7590 06TTY6 Power Adapter
$35.99
Dell 130w PA-4E OEM LA130PM121 DA130PE1-00 Genuine Laptop AC adapter Charger
$14.99
NEW OEM Dell 65W 19.5V Charger AC Power Supply Adapter For LA65NM130 332-1831
$12.99
NEW OEM USB-C Type-C Charger For Dell XPS 15 2in1 9575 Precision 5530 130W
$35.99
OEM Dell Inspiron 11 13 14 15 17 3000 5000 7000 AC Adapter Charger 65W 4.5mm Tip
$10.99
OEM 130W USB-C Type-C Charger for Dell XPS 15 9500 9570 9575 17 9700 DA130PM170
$35.88
OEM Dell 90W Laptop Charger AC Adapter 19.5V 4.62A 50-60 Hz Latitude, XPS
$8.74
Dell Original OEM 45W 19.5V AC Adapter Charger 070VTC 0KXTTW 00285K 0YTFJC 4.5mm
$10.94
OEM 130W Power Adapter Charger For Dell XPS 15 9530 9550 9560 9570 7590 06TTY6
$33.22
Genuine OEM 42wh YRDD6 Battery For Dell Inspiron 3493 3582 3583 3584 7586 3793
$32.89
|
||
No Discussions have been posted on this vulnerability. |