|
|
Subscribe / Log in / New account

xorg-x11-server: privilege escalation

Package(s):xorg-x11-server CVE #(s):CVE-2006-0745
Created:March 20, 2006 Updated:March 22, 2006
Description: Coverity scanned the X.Org source code for problems and reported their findings to the X.Org development team. Upon analysis, Alan Coopersmith, a member of the X.Org development team, noticed a couple of serious security issues in the findings. In particular, the Xorg server can be exploited for root privilege escalation by passing a path to malicious modules using the -modulepath command line argument. Also, the Xorg server can be exploited to overwrite any root writable file on the filesystem with the -logfile command line argument. See this bulletin for more details.
Alerts:
SuSE SUSE-SA:2006:016 xorg-x11-server 2006-03-21
Mandriva MDKSA-2006:056 xorg-x11 2006-03-20
Fedora FEDORA-2006-172 xorg-x11-server 2006-03-20

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds