Important: xorg-x11 security updateThe xorg-x11 packages contain X.Org, an open source implementation of the XWindow System. It provides the basic low-level functionality thatfull-fledged graphical user interfaces are designed upon.Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHMmodules. A malicious authorized client could exploit these issues to causea denial of service (crash), or potentially execute arbitrary code withroot privileges on the X.Org server. (CVE-2007-6429)A heap based buffer overflow flaw was found in the way the X.Org serverhandled malformed font files. A malicious local user could exploit theseissues to potentially execute arbitrary code with the privileges of theX.Org server. (CVE-2008-0006)A memory corruption flaw was found in the X.Org server's XInput extension.A malicious authorized client could exploit this issue to cause a denial ofservice (crash), or potentially execute arbitrary code with root privilegeson the X.Org server. (CVE-2007-6427)An input validation flaw was found in the X.Org server's XFree86-Miscextension. A malicious authorized client could exploit this issue to causea denial of service (crash), or potentially execute arbitrary code withroot privileges on the X.Org server. (CVE-2007-5760)An information disclosure flaw was found in the X.Org server's TOG-CUPextension. A malicious authorized client could exploit this issue to causea denial of service (crash), or potentially view arbitrary memory contentwithin the X server's address space. (CVE-2007-6428)An integer and heap overflow flaw were found in the X.Org font server, xfs.A user with the ability to connect to the font server could have been ableto cause a denial of service (crash), or potentially execute arbitrary codewith the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)A flaw was found in the X.Org server's XC-SECURITY extension, that couldhave allowed a local user to verify the existence of an arbitrary file,even in directories that are not normally accessible to that user.(CVE-2007-5958)Users of xorg-x11 should upgrade to these updated packages, which containbackported patches to resolve these issues.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center