Amazon Linux AMI : xorg-x11-server (ALAS-2014-277)

Medium Nessus Plugin ID 72295


The remote Amazon Linux AMI host is missing a security update.


An integer overflow, which led to a heap-based buffer overflow, was found in the way X.Org server handled trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with root privileges.


Run 'yum update xorg-x11-server' to update your system.

See Also

Plugin Details

Severity: Medium

ID: 72295

File Name: ala_ALAS-2014-277.nasl

Version: 1.6

Type: local

Agent: unix

Published: 2014/02/05

Updated: 2018/04/18

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:xorg-x11-server-Xdmx, p-cpe:/a:amazon:linux:xorg-x11-server-Xephyr, p-cpe:/a:amazon:linux:xorg-x11-server-Xnest, p-cpe:/a:amazon:linux:xorg-x11-server-Xorg, p-cpe:/a:amazon:linux:xorg-x11-server-Xvfb, p-cpe:/a:amazon:linux:xorg-x11-server-common, p-cpe:/a:amazon:linux:xorg-x11-server-debuginfo, p-cpe:/a:amazon:linux:xorg-x11-server-devel, p-cpe:/a:amazon:linux:xorg-x11-server-source, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 2014/01/14

Reference Information

CVE: CVE-2013-6424

ALAS: 2014-277

RHSA: 2013:1868