FreeBSD : Xorg server -- two vulnerabilities in X server lock handling code (8441957c-f9b4-11e0-a78a-bcaec565249c)

Low Nessus Plugin ID 56548


The remote FreeBSD host is missing a security-related update.


Matthieu Herrb reports :

It is possible to deduce if a file exists or not by exploiting the way that Xorg creates its lock files. This is caused by the fact that the X server is behaving differently if the lock file already exists as a symbolic link pointing to an existing or non-existing file.

It is possible for a non-root user to set the permissions for all users on any file or directory to 444, giving unwanted read access or causing denies of service (by removing execute permission). This is caused by a race between creating the lock file and setting its access modes.


Update the affected package.

See Also

Plugin Details

Severity: Low

ID: 56548

File Name: freebsd_pkg_8441957cf9b411e0a78abcaec565249c.nasl

Version: $Revision: 1.4 $

Type: local

Published: 2011/10/19

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 1.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xorg-server, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/10/18

Vulnerability Publication Date: 2011/10/18

Reference Information

CVE: CVE-2011-4028, CVE-2011-4029