RHEL 3 : XFree86 (RHSA-2005:501)

medium Nessus Plugin ID 19712

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated XFree86 packages that fix several integer overflows, various bugs, and add ATI RN50/ES1000 support are now available for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red Hat Security Response Team.

XFree86 is an implementation of the X Window System, which provides the core functionality for the Linux graphical desktop.

Several integer overflow bugs were found in the way XFree86 parses pixmap images. It is possible for a user to gain elevated privileges by loading a specially crafted pixmap image. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2495 to this issue.

Additionally this update adds the following new features in this release: - Support for ATI RN50/ES1000 chipsets has been added.

The following bugs were also fixed in this release: - A problem with the X server's module loading system that led to cache incoherency on the Itanium architecture.

- The X server's PCI config space accesses caused contention with the kernel if accesses occurred while the kernel lock was held.

- X font server (xfs) crashed when accessing Type 1 fonts via showfont.

- A problem with the X transport library prevented X applications from starting if the hostname started with a digit.

- An issue where refresh rates were being restricted to 60Hz on some Intel i8xx systems

Users of XFree86 should upgrade to these updated packages, which contain a backported patch and are not vulnerable to this issue.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2005-2495

https://access.redhat.com/errata/RHSA-2005:501

Plugin Details

Severity: Medium

ID: 19712

File Name: redhat-RHSA-2005-501.nasl

Version: 1.24

Type: local

Agent: unix

Published: 9/17/2005

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xfree86, p-cpe:/a:redhat:enterprise_linux:xfree86-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-14-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-14-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-15-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-15-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-2-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-2-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-9-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-iso8859-9-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-mesa-libgl, p-cpe:/a:redhat:enterprise_linux:xfree86-mesa-libglu, p-cpe:/a:redhat:enterprise_linux:xfree86-xnest, p-cpe:/a:redhat:enterprise_linux:xfree86-xvfb, p-cpe:/a:redhat:enterprise_linux:xfree86-base-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-cyrillic-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-devel, p-cpe:/a:redhat:enterprise_linux:xfree86-doc, p-cpe:/a:redhat:enterprise_linux:xfree86-font-utils, p-cpe:/a:redhat:enterprise_linux:xfree86-libs, p-cpe:/a:redhat:enterprise_linux:xfree86-libs-data, p-cpe:/a:redhat:enterprise_linux:xfree86-sdk, p-cpe:/a:redhat:enterprise_linux:xfree86-syriac-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-tools, p-cpe:/a:redhat:enterprise_linux:xfree86-truetype-fonts, p-cpe:/a:redhat:enterprise_linux:xfree86-twm, p-cpe:/a:redhat:enterprise_linux:xfree86-xauth, p-cpe:/a:redhat:enterprise_linux:xfree86-xdm, p-cpe:/a:redhat:enterprise_linux:xfree86-xfs, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 9/15/2005

Vulnerability Publication Date: 9/15/2005

Reference Information

CVE: CVE-2005-2495

RHSA: 2005:501