RHEL 5 / 6 : xorg-x11-server-utils (RHSA-2011:0433)

This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An updated xorg-x11-server-utils package that fixes one security issue
is now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.

The xorg-x11-server-utils package contains a collection of utilities
used to modify and query the runtime configuration of the X.Org
server. X.Org is an open source implementation of the X Window System.

A flaw was found in the X.Org X server resource database utility,
xrdb. Certain variables were not properly sanitized during the launch
of a user's graphical session, which could possibly allow a remote
attacker to execute arbitrary code with root privileges, if they were
able to make the display manager execute xrdb with a specially crafted
X client hostname. For example, by configuring the hostname on the
target system via a crafted DHCP reply, or by using the X Display
Manager Control Protocol (XDMCP) to connect to that system from a host
that has a special DNS name. (CVE-2011-0465)

Red Hat would like to thank Matthieu Herrb for reporting this issue.
Upstream acknowledges Sebastian Krahmer of the SuSE Security Team as
the original reporter.

Users of xorg-x11-server-utils should upgrade to this updated package,
which contains a backported patch to resolve this issue. All running
X.Org server instances must be restarted for this update to take

See also :


Solution :

Update the affected xorg-x11-server-utils and / or
xorg-x11-server-utils-debuginfo packages.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 53371 ()

Bugtraq ID: 47189

CVE ID: CVE-2011-0465

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now