Slackware 10.1 / 10.2 / current : xorg server overflow (SSA:2006-123-01)

low Nessus Plugin ID 21342

Synopsis

The remote Slackware host is missing a security update.

Description

New xorg and xorg-devel packages are available for Slackware 10.1, 10.2, and -current to fix a security issue. A typo in the X render extension in X.Org 6.8.0 or later allows an X client to crash the server and possibly to execute arbitrary code as the X server user (typically this is 'root'.)

Solution

Update the affected x11 and / or x11-devel packages.

See Also

https://lists.freedesktop.org/archives/xorg/2006-May/015136.html

http://www.nessus.org/u?1439b67a

Plugin Details

Severity: Low

ID: 21342

File Name: Slackware_SSA_2006-123-01.nasl

Version: 1.15

Type: local

Published: 5/13/2006

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:x11, p-cpe:/a:slackware:slackware_linux:x11-devel, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:10.1, cpe:/o:slackware:slackware_linux:10.2

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 5/3/2006

Reference Information

CVE: CVE-2006-1526

SSA: 2006-123-01