Vulnerability CVE-2006-0745


Published: 2006-03-20   Modified: 2012-02-12

Description:
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
X.Org Security Advisory: privilege escalation and DoS in X11R6.9, X11R7.0
Daniel Stone
20.03.2006
High
xorg-x11-server modulepath Local Privilege Escalation
Marco Ivaldi
03.12.2018

Type:

CWE-Other

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
X.org -> X11r6 
X.org -> X11r7 
SUSE -> Suse linux 
SUN -> Solaris 
Redhat -> Fedora core 
Mandrakesoft -> Mandrake linux 

 References:
http://securityreason.com/securityalert/606
http://securitytracker.com/id?1015793
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1
http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm
http://www.mandriva.com/security/advisories?name=MDKSA-2006:056
http://www.novell.com/linux/security/advisories/2006_16_xorgx11server.html
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00026.html
http://www.securityfocus.com/archive/1/428183/100/0/threaded
http://www.securityfocus.com/archive/1/428230/100/0/threaded
http://www.securityfocus.com/bid/17169
http://www.vupen.com/english/advisories/2006/1017
http://www.vupen.com/english/advisories/2006/1028
https://exchange.xforce.ibmcloud.com/vulnerabilities/25341
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1697

Copyright 2024, cxsecurity.com

 

Back to Top