FreeBSD : xrdb -- root hole via rogue hostname (2eccb24f-61c0-11e0-b199-0015f2db7bde)

High Nessus Plugin ID 53439


The remote FreeBSD host is missing a security-related update.


Matthias Hopf reports :

By crafting hostnames with shell escape characters, arbitrary commands can be executed in a root environment when a display manager reads in the resource database via xrdb.

These specially crafted hostnames can occur in two environments :

Systems are affected are: systems set their hostname via DHCP, and the used DHCP client allows setting of hostnames with illegal characters.
And systems that allow remote logins via xdmcp.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 53439

File Name: freebsd_pkg_2eccb24f61c011e0b1990015f2db7bde.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2011/04/15

Modified: 2017/04/15

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xrdb, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/04/14

Vulnerability Publication Date: 2011/04/05

Reference Information

CVE: CVE-2011-0465

IAVA: 2017-A-0098