Rapid7 Vulnerability & Exploit Database

CESA-2008:0030: RHSA-2008:0030

Back to Search

CESA-2008:0030: RHSA-2008:0030

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
01/18/2008
Created
07/25/2018
Added
03/12/2010
Modified
08/29/2017

Description

Important: xorg-x11 security updateThe xorg-x11 packages contain X.Org, an open source implementation of the XWindow System. It provides the basic low-level functionality thatfull-fledged graphical user interfaces are designed upon.Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHMmodules. A malicious authorized client could exploit these issues to causea denial of service (crash), or potentially execute arbitrary code withroot privileges on the X.Org server. (CVE-2007-6429)A heap based buffer overflow flaw was found in the way the X.Org serverhandled malformed font files. A malicious local user could exploit theseissues to potentially execute arbitrary code with the privileges of theX.Org server. (CVE-2008-0006)A memory corruption flaw was found in the X.Org server's XInput extension.A malicious authorized client could exploit this issue to cause a denial ofservice (crash), or potentially execute arbitrary code with root privilegeson the X.Org server. (CVE-2007-6427)An input validation flaw was found in the X.Org server's XFree86-Miscextension. A malicious authorized client could exploit this issue to causea denial of service (crash), or potentially execute arbitrary code withroot privileges on the X.Org server. (CVE-2007-5760)An information disclosure flaw was found in the X.Org server's TOG-CUPextension. A malicious authorized client could exploit this issue to causea denial of service (crash), or potentially view arbitrary memory contentwithin the X server's address space. (CVE-2007-6428)An integer and heap overflow flaw were found in the X.Org font server, xfs.A user with the ability to connect to the font server could have been ableto cause a denial of service (crash), or potentially execute arbitrary codewith the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)A flaw was found in the X.Org server's XC-SECURITY extension, that couldhave allowed a local user to verify the existence of an arbitrary file,even in directories that are not normally accessible to that user.(CVE-2007-5958)Users of xorg-x11 should upgrade to these updated packages, which containbackported patches to resolve these issues.

Solution(s)

  • centos-upgrade-xorg-x11
  • centos-upgrade-xorg-x11-deprecated-libs
  • centos-upgrade-xorg-x11-deprecated-libs-devel
  • centos-upgrade-xorg-x11-devel
  • centos-upgrade-xorg-x11-doc
  • centos-upgrade-xorg-x11-font-utils
  • centos-upgrade-xorg-x11-libs
  • centos-upgrade-xorg-x11-mesa-libgl
  • centos-upgrade-xorg-x11-mesa-libglu
  • centos-upgrade-xorg-x11-sdk
  • centos-upgrade-xorg-x11-tools
  • centos-upgrade-xorg-x11-twm
  • centos-upgrade-xorg-x11-xauth
  • centos-upgrade-xorg-x11-xdm
  • centos-upgrade-xorg-x11-xdmx
  • centos-upgrade-xorg-x11-xfs
  • centos-upgrade-xorg-x11-xnest
  • centos-upgrade-xorg-x11-xvfb

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;