Mandriva Linux Security Advisory : x11-server (MDVSA-2008:023)

high Nessus Plugin ID 37567

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

An input validation flaw was found in the X.org server's XFree86-Misc extension that could allow a malicious authorized client to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.org server (CVE-2007-5760).

A flaw was found in the X.org server's XC-SECURITY extension that could allow a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user (CVE-2007-5958).

A memory corruption flaw was found in the X.org server's XInput extension that could allow a malicious authorized client to cause a denial of service (crash) or potentially execute arbitrary code with root privileges on the X.org server (CVE-2007-6427).

An information disclosure flaw was found in the X.org server's TOG-CUP extension that could allow a malicious authorized client to cause a denial of service (crash) or potentially view arbitrary memory content within the X.org server's address space (CVE-2007-6428).

Two integer overflow flaws were found in the X.org server's EVI and MIT-SHM modules that could allow a malicious authorized client to cause a denial of service (crash) or potentially execute arbitrary code with the privileges of the X.org server (CVE-2007-6429).

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 37567

File Name: mandriva_MDVSA-2008-023.nasl

Version: 1.16

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:x11-server, p-cpe:/a:mandriva:linux:x11-server-common, p-cpe:/a:mandriva:linux:x11-server-devel, p-cpe:/a:mandriva:linux:x11-server-xati, p-cpe:/a:mandriva:linux:x11-server-xchips, p-cpe:/a:mandriva:linux:x11-server-xdmx, p-cpe:/a:mandriva:linux:x11-server-xephyr, p-cpe:/a:mandriva:linux:x11-server-xepson, p-cpe:/a:mandriva:linux:x11-server-xfake, p-cpe:/a:mandriva:linux:x11-server-xfbdev, p-cpe:/a:mandriva:linux:x11-server-xi810, p-cpe:/a:mandriva:linux:x11-server-xmach64, p-cpe:/a:mandriva:linux:x11-server-xmga, p-cpe:/a:mandriva:linux:x11-server-xneomagic, p-cpe:/a:mandriva:linux:x11-server-xnest, p-cpe:/a:mandriva:linux:x11-server-xnvidia, p-cpe:/a:mandriva:linux:x11-server-xorg, p-cpe:/a:mandriva:linux:x11-server-xpm2, p-cpe:/a:mandriva:linux:x11-server-xprt, p-cpe:/a:mandriva:linux:x11-server-xr128, p-cpe:/a:mandriva:linux:x11-server-xsdl, p-cpe:/a:mandriva:linux:x11-server-xsmi, p-cpe:/a:mandriva:linux:x11-server-xvesa, p-cpe:/a:mandriva:linux:x11-server-xvfb, p-cpe:/a:mandriva:linux:x11-server-xvia, p-cpe:/a:mandriva:linux:x11-server-xvnc, cpe:/o:mandriva:linux:2007, cpe:/o:mandriva:linux:2007.1, cpe:/o:mandriva:linux:2008.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/23/2008

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-5760, CVE-2007-5958, CVE-2007-6427, CVE-2007-6428, CVE-2007-6429, CVE-2008-0006

CWE: 119, 189, 200, 362, 399

MDVSA: 2008:023