Rapid7 Vulnerability & Exploit Database

RHSA-2011:1359: xorg-x11-server security update

Back to Search

RHSA-2011:1359: xorg-x11-server security update

Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
10/06/2011
Created
07/25/2018
Added
10/12/2011
Modified
07/04/2017

Description

X.Org is an open source implementation of the X Window System. It providesthe basic low-level functionality that full-fledged graphical userinterfaces are designed upon.Multiple input sanitization flaws were found in the X.Org GLX (OpenGLextension to the X Window System) extension. A malicious, authorized clientcould use these flaws to crash the X.Org server or, potentially, executearbitrary code with root privileges. (CVE-2010-4818)An input sanitization flaw was found in the X.Org Render extension. Amalicious, authorized client could use this flaw to leak arbitrary memoryfrom the X.Org server process, or possibly crash the X.Org server.(CVE-2010-4819)Users of xorg-x11-server should upgrade to these updated packages, whichcontain backported patches to resolve these issues. All running X.Orgserver instances must be restarted for this update to take effect.

Solution(s)

  • redhat-upgrade-xorg-x11-server-common
  • redhat-upgrade-xorg-x11-server-debuginfo
  • redhat-upgrade-xorg-x11-server-devel
  • redhat-upgrade-xorg-x11-server-sdk
  • redhat-upgrade-xorg-x11-server-source
  • redhat-upgrade-xorg-x11-server-xdmx
  • redhat-upgrade-xorg-x11-server-xephyr
  • redhat-upgrade-xorg-x11-server-xnest
  • redhat-upgrade-xorg-x11-server-xorg
  • redhat-upgrade-xorg-x11-server-xvfb
  • redhat-upgrade-xorg-x11-server-xvnc-source

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;