How to Buy
This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated XFree86 packages that fix several integer overflows, various
bugs, and add ATI RN50/ES1000 support are now available for Red Hat
Enterprise Linux 3.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
XFree86 is an implementation of the X Window System, which provides
the core functionality for the Linux graphical desktop.
Several integer overflow bugs were found in the way XFree86 parses
pixmap images. It is possible for a user to gain elevated privileges
by loading a specially crafted pixmap image. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2005-2495 to this issue.
Additionally this update adds the following new features in this
release: - Support for ATI RN50/ES1000 chipsets has been added.
The following bugs were also fixed in this release: - A problem with
the X server's module loading system that led to cache incoherency on
the Itanium architecture.
- The X server's PCI config space accesses caused
contention with the kernel if accesses occurred while
the kernel lock was held.
- X font server (xfs) crashed when accessing Type 1 fonts
- A problem with the X transport library prevented X
applications from starting if the hostname started with
- An issue where refresh rates were being restricted to
60Hz on some Intel i8xx systems
Users of XFree86 should upgrade to these updated packages, which
contain a backported patch and are not vulnerable to this issue.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.1
Family: Red Hat Local Security Checks
Nessus Plugin ID: 19712 ()
CVE ID: CVE-2005-2495
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.