8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.021 Low
EPSS
Percentile
88.9%
CentOS Errata and Security Advisory CESA-2008:0031
X.Org is an open source implementation of the X Window System. It provides
basic low-level functionality that full-fledged graphical user interfaces
are designed upon.
Two integer overflow flaws were found in the X.Org server’s EVI and MIT-SHM
modules. A malicious authorized client could exploit these issues to cause
a denial of service (crash), or potentially execute arbitrary code with
root privileges on the X.Org server. (CVE-2007-6429)
A memory corruption flaw was found in the X.Org server’s XInput extension.
A malicious authorized client could exploit this issue to cause a denial of
service (crash), or potentially execute arbitrary code with root privileges
on the X.Org server. (CVE-2007-6427)
An input validation flaw was found in the X.Org server’s XFree86-Misc
extension. A malicious authorized client could exploit this issue to cause
a denial of service (crash), or potentially execute arbitrary code with
root privileges on the X.Org server. (CVE-2007-5760)
An information disclosure flaw was found in the X.Org server’s TOG-CUP
extension. A malicious authorized client could exploit this issue to cause
a denial of service (crash), or potentially view arbitrary memory content
within the X server’s address space. (CVE-2007-6428)
A flaw was found in the X.Org server’s XC-SECURITY extension, that could
have allowed a local user to verify the existence of an arbitrary file,
even in directories that are not normally accessible to that user.
(CVE-2007-5958)
Users of xorg-x11-server should upgrade to these updated packages, which
contain backported patches to resolve these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-January/076782.html
https://lists.centos.org/pipermail/centos-announce/2008-January/076783.html
https://lists.centos.org/pipermail/centos-announce/2008-January/089543.html
https://lists.centos.org/pipermail/centos-announce/2008-January/089544.html
Affected packages:
xorg-x11-server-Xdmx
xorg-x11-server-Xephyr
xorg-x11-server-Xnest
xorg-x11-server-Xorg
xorg-x11-server-Xvfb
xorg-x11-server-sdk
Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0031