GLSA-200608-25 : X.org and some X.org libraries: Local privilege escalations

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200608-25
(X.org and some X.org libraries: Local privilege escalations)

Several X.org libraries and X.org itself contain system calls to
set*uid() functions, without checking their result.

Impact :

Local users could deliberately exceed their assigned resource limits
and elevate their privileges after an unsuccessful set*uid() system
call. This requires resource limits to be enabled on the machine.

Workaround :

There is no known workaround at this time.

See also :

http://lists.freedesktop.org/archives/xorg/2006-June/016146.html
http://www.gentoo.org/security/en/glsa/glsa-200608-25.xml

Solution :

All X.Org xdm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-apps/xdm-1.0.4-r1'
All X.Org xinit users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-apps/xinit-1.0.2-r6'
All X.Org xload users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-apps/xload-1.0.1-r1'
All X.Org xf86dga users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-apps/xf86dga-1.0.1-r1'
All X.Org users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-base/xorg-x11-6.9.0-r2'
All X.Org X servers users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-base/xorg-server-1.1.0-r1'
All X.Org X11 library users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-libs/libx11-1.0.1-r1'
All X.Org xtrans library users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-libs/xtrans-1.0.1-r1'
All xterm users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-terms/xterm-215'
All users of the X11R6 libraries for emulation of 32bit x86 on amd64
should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/emul-linux-x86-xlibs-7.0-r2'
Please note that the fixed packages have been available for most
architectures since June 30th but the GLSA release was held up waiting
for the remaining architectures.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 22287 (gentoo_GLSA-200608-25.nasl)

Bugtraq ID:

CVE ID: CVE-2006-4447