CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
37.0%
X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit.
Vendor | Product | Version | CPE |
---|---|---|---|
x.org | emu-linux-x87-xlibs | 7.0_r1 | cpe:2.3:a:x.org:emu-linux-x87-xlibs:7.0_r1:*:*:*:*:*:*:* |
x.org | x11r6 | 6.7.0 | cpe:2.3:a:x.org:x11r6:6.7.0:*:*:*:*:*:*:* |
x.org | x11r6 | 6.8 | cpe:2.3:a:x.org:x11r6:6.8:*:*:*:*:*:*:* |
x.org | x11r6 | 6.8.1 | cpe:2.3:a:x.org:x11r6:6.8.1:*:*:*:*:*:*:* |
x.org | x11r6 | 6.8.2 | cpe:2.3:a:x.org:x11r6:6.8.2:*:*:*:*:*:*:* |
x.org | x11r7 | 1.0 | cpe:2.3:a:x.org:x11r7:1.0:*:*:*:*:*:*:* |
x.org | x11r7 | 1.0.1 | cpe:2.3:a:x.org:x11r7:1.0.1:*:*:*:*:*:*:* |
x.org | x11r7 | 1.0.2 | cpe:2.3:a:x.org:x11r7:1.0.2:*:*:*:*:*:*:* |
x.org | xdm | 1.0.3 | cpe:2.3:a:x.org:xdm:1.0.3:*:*:*:*:*:*:* |
x.org | xf86dga | 1.0.0 | cpe:2.3:a:x.org:xf86dga:1.0.0:*:*:*:*:*:*:* |
lists.freedesktop.org/archives/xorg/2006-June/016146.html
mail.gnome.org/archives/beast/2006-December/msg00025.html
secunia.com/advisories/21650
secunia.com/advisories/21660
secunia.com/advisories/21693
secunia.com/advisories/22332
secunia.com/advisories/25032
secunia.com/advisories/25059
security.gentoo.org/glsa/glsa-200608-25.xml
security.gentoo.org/glsa/glsa-200704-22.xml
www.debian.org/security/2006/dsa-1193
www.kb.cert.org/vuls/id/300368
www.mandriva.com/security/advisories?name=MDKSA-2006:160
www.securityfocus.com/bid/19742
www.securityfocus.com/bid/23697
www.vupen.com/english/advisories/2006/3409
www.vupen.com/english/advisories/2007/0409