Rapid7 Vulnerability & Exploit Database

RHSA-2011:0432: xorg-x11 security update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

RHSA-2011:0432: xorg-x11 security update



X.Org is an open source implementation of the X Window System. It providesthe basic low-level functionality that full-fledged graphical userinterfaces are designed upon.A flaw was found in the X.Org X server resource database utility, xrdb.Certain variables were not properly sanitized during the launch of a user'sgraphical session, which could possibly allow a remote attacker to executearbitrary code with root privileges, if they were able to make the displaymanager execute xrdb with a specially-crafted X client hostname. Forexample, by configuring the hostname on the target system via a craftedDHCP reply, or by using the X Display Manager Control Protocol (XDMCP) toconnect to that system from a host that has a special DNS name.(CVE-2011-0465)Red Hat would like to thank Matthieu Herrb for reporting this issue.Upstream acknowledges Sebastian Krahmer of the SuSE Security Team as theoriginal reporter.Users of xorg-x11 should upgrade to these updated packages, which contain abackported patch to resolve this issue. All running X.Org server instancesmust be restarted for this update to take effect.


  • redhat-upgrade-xorg-x11
  • redhat-upgrade-xorg-x11-deprecated-libs
  • redhat-upgrade-xorg-x11-deprecated-libs-devel
  • redhat-upgrade-xorg-x11-devel
  • redhat-upgrade-xorg-x11-doc
  • redhat-upgrade-xorg-x11-font-utils
  • redhat-upgrade-xorg-x11-libs
  • redhat-upgrade-xorg-x11-mesa-libgl
  • redhat-upgrade-xorg-x11-mesa-libglu
  • redhat-upgrade-xorg-x11-sdk
  • redhat-upgrade-xorg-x11-tools
  • redhat-upgrade-xorg-x11-twm
  • redhat-upgrade-xorg-x11-xauth
  • redhat-upgrade-xorg-x11-xdm
  • redhat-upgrade-xorg-x11-xdmx
  • redhat-upgrade-xorg-x11-xfs
  • redhat-upgrade-xorg-x11-xnest
  • redhat-upgrade-xorg-x11-xvfb

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center