Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0745

Overview

Vulnerability Score 7.2 7.2
CVE Id CVE-2006-0745
Last Modified 07 Mar 2011 09:30:44
Published 20 Mar 2006 09:06:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2006-0745

Summary

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

Vulnerable Systems

Operating System

  • Mandrakesoft Mandrake Linux 2006

  • Redhat Fedora Core Core 5.0

  • Sun Solaris 10.0

  • Suse Linux 10.0

Application

  • X.org X11r6 6.9

  • X.org X11r7 1.0

  • X.org X11r7 1.0.1


References

BID - 17169

BUGTRAQ - 20060320 [CVE-2006-0745] X.Org Security Advisory: privilege escalation and DoS in X11R6.9, X11R7.0

VUPEN - ADV-2006-1028

VUPEN - ADV-2006-1017

BUGTRAQ - 20060320 Re: [CVE-2006-0745] X.Org Security Advisory: privilege escalation and DoS in X11R6.9, X11R7.0

XF - xorg-geteuid-privilege-escalation(25341)

FEDORA - FEDORA-2006-172

OSVDB - 24001

OSVDB - 24000

SUSE - SUSE-SA:2006:016

MANDRIVA - MDKSA-2006:056

CONFIRM - http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm

SUNALERT - 102252

SECTRACK - 1015793

SREASON - 606

SECUNIA - 19676

SECUNIA - 19316

SECUNIA - 19311

SECUNIA - 19307

SECUNIA - 19256


Last Updated: 27 May 2016 10:41:46