[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:023 -- Mandriva x11-server

ID: oval:org.secpod.oval:def:301636Date: (C)2012-01-07   (M)2021-06-02
Class: PATCHFamily: unix




An input validation flaw was found in the X.org server"s XFree86-Misc extension that could allow a malicious authorized client to cause a denial of service , or potentially execute arbitrary code with root privileges on the X.org server . A flaw was found in the X.org server"s XC-SECURITY extension that could allow a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user . A memory corruption flaw was found in the X.org server"s XInput extension that could allow a malicious authorized client to cause a denial of service or potentially execute arbitrary code with root privileges on the X.org server . An information disclosure flaw was found in the X.org server"s TOG-CUP extension that could allow a malicious authorized client to cause a denial of service or potentially view arbitrary memory content within the X.org server"s address space . Two integer overflow flaws were found in the X.org server"s EVI and MIT-SHM modules that could allow a malicious authorized client to cause a denial of service or potentially execute arbitrary code with the privileges of the X.org server . The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2007.0
Mandriva Linux 2007.1
Mandriva Linux 2008.0
Product:
x11-server
Reference:
MDVSA-2008:023
CVE-2007-5760
CVE-2007-5958
CVE-2007-6427
CVE-2007-6428
CVE-2007-6429
CVE    5
CVE-2007-5958
CVE-2007-6427
CVE-2007-6428
CVE-2007-6429
...
CPE    3
cpe:/o:mandriva:linux:2007.1
cpe:/o:mandriva:linux:2008.0
cpe:/o:mandriva:linux:2007.0

© SecPod Technologies