Rapid7 Vulnerability & Exploit Database

Gentoo Linux: CVE-2006-4447: X.org and some X.org libraries: Local privilege escalations

Back to Search

Gentoo Linux: CVE-2006-4447: X.org and some X.org libraries: Local privilege escalations

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
08/29/2006
Created
07/25/2018
Added
10/30/2017
Modified
10/30/2017

Description

X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit.

Solution(s)

  • gentoo-linux-upgrade-app-emulation-emul-linux-x86-xlibs
  • gentoo-linux-upgrade-x11-apps-xdm
  • gentoo-linux-upgrade-x11-apps-xf86dga
  • gentoo-linux-upgrade-x11-apps-xinit
  • gentoo-linux-upgrade-x11-apps-xload
  • gentoo-linux-upgrade-x11-base-xorg-server
  • gentoo-linux-upgrade-x11-base-xorg-x11
  • gentoo-linux-upgrade-x11-libs-libx11
  • gentoo-linux-upgrade-x11-libs-xtrans
  • gentoo-linux-upgrade-x11-terms-xterm

References

  • gentoo-linux-upgrade-app-emulation-emul-linux-x86-xlibs
  • gentoo-linux-upgrade-x11-apps-xdm
  • gentoo-linux-upgrade-x11-apps-xf86dga
  • gentoo-linux-upgrade-x11-apps-xinit
  • gentoo-linux-upgrade-x11-apps-xload
  • gentoo-linux-upgrade-x11-base-xorg-server
  • gentoo-linux-upgrade-x11-base-xorg-x11
  • gentoo-linux-upgrade-x11-libs-libx11
  • gentoo-linux-upgrade-x11-libs-xtrans
  • gentoo-linux-upgrade-x11-terms-xterm

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;