Mandriva Linux Security Advisory : x11-server (MDVSA-2008:116)

critical Nessus Plugin ID 38138

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

An input validation flaw was found in X.org's Security and Record extensions. A malicious authorized client could exploit the issue to cause a denial of service (crash) or possibly execute arbitrary code with root privileges on the X.org server (CVE-2008-1377).

An input validation flaw was found in X.org's MIT-SHM extension. A client connected to the X.org server could read arbitrary server memory, resulting in the disclosure of sensitive data of other users of the X.org server (CVE-2008-1379).

Multiple integer overflows were found in X.org's Render extension. A malicious authorized client could exploit these issues to cause a denial of service (crash) or possibly execute arbitrary code with root privileges on the X.org server (CVE-2008-2360, CVE-2008-2361, CVE-2008-2362).

In addition, this update corrects a problem that could cause memory corruption or segfaults in the render code of the vnc server on Mandriva Linux 2008.1

The updated packages have been patched to prevent these issues.

Solution

Update the affected packages.

Plugin Details

Severity: Critical

ID: 38138

File Name: mandriva_MDVSA-2008-116.nasl

Version: 1.15

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:x11-server, p-cpe:/a:mandriva:linux:x11-server-common, p-cpe:/a:mandriva:linux:x11-server-devel, p-cpe:/a:mandriva:linux:x11-server-xati, p-cpe:/a:mandriva:linux:x11-server-xchips, p-cpe:/a:mandriva:linux:x11-server-xdmx, p-cpe:/a:mandriva:linux:x11-server-xephyr, p-cpe:/a:mandriva:linux:x11-server-xepson, p-cpe:/a:mandriva:linux:x11-server-xfake, p-cpe:/a:mandriva:linux:x11-server-xfbdev, p-cpe:/a:mandriva:linux:x11-server-xgl, p-cpe:/a:mandriva:linux:x11-server-xi810, p-cpe:/a:mandriva:linux:x11-server-xmach64, p-cpe:/a:mandriva:linux:x11-server-xmga, p-cpe:/a:mandriva:linux:x11-server-xneomagic, p-cpe:/a:mandriva:linux:x11-server-xnest, p-cpe:/a:mandriva:linux:x11-server-xnvidia, p-cpe:/a:mandriva:linux:x11-server-xorg, p-cpe:/a:mandriva:linux:x11-server-xpm2, p-cpe:/a:mandriva:linux:x11-server-xprt, p-cpe:/a:mandriva:linux:x11-server-xr128, p-cpe:/a:mandriva:linux:x11-server-xsdl, p-cpe:/a:mandriva:linux:x11-server-xsmi, p-cpe:/a:mandriva:linux:x11-server-xvesa, p-cpe:/a:mandriva:linux:x11-server-xvfb, p-cpe:/a:mandriva:linux:x11-server-xvia, p-cpe:/a:mandriva:linux:x11-server-xvnc, cpe:/o:mandriva:linux:2007.1, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2008.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 6/16/2008

Reference Information

CVE: CVE-2008-1377, CVE-2008-1379, CVE-2008-2360, CVE-2008-2361, CVE-2008-2362

CWE: 189

MDVSA: 2008:116