Updated xorg-x11-apps and libX11 packages fix a security issu
Reporter | Title | Published | Views | Family All 112 |
---|---|---|---|---|
UbuntuCve | CVE-2007-1667 | 24 Mar 200700:00 | – | ubuntucve |
UbuntuCve | CVE-2007-1797 | 2 Apr 200700:00 | – | ubuntucve |
Prion | Integer overflow | 24 Mar 200721:19 | – | prion |
Prion | Integer overflow | 2 Apr 200722:19 | – | prion |
securityvulns | X.Org libx11 library buffer overflow | 25 Mar 200700:00 | – | securityvulns |
Fedora | [SECURITY] Fedora Core 6 Update: libX11-1.0.3-7.fc6 | 10 Apr 200716:51 | – | fedora |
Fedora | [SECURITY] Fedora Core 5 Update: libX11-1.0.0-4.fc5 | 10 Apr 200716:52 | – | fedora |
OpenVAS | Ubuntu Update for rdesktop regression USN-453-2 | 23 Mar 200900:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200705-06 (libx11) | 24 Sep 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200705-06 (libx11) | 24 Sep 200800:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2007:0157 and
# Oracle Linux Security Advisory ELSA-2007-0157 respectively.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(67472);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2007-1667");
script_bugtraq_id(23300);
script_xref(name:"RHSA", value:"2007:0157");
script_name(english:"Oracle Linux 5 : libX11 / xorg-x11-apps (ELSA-2007-0157)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Oracle Linux host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"From Red Hat Security Advisory 2007:0157 :
Updated xorg-x11-apps and libX11 packages that fix a security issue
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
X.org is an open source implementation of the X Window System. It
provides the basic low-level functionality that full-fledged graphical
user interfaces are designed upon.
An integer overflow flaw was found in the X.org XGetPixel() function.
Improper use of this function could cause an application calling it to
function improperly, possibly leading to a crash or arbitrary code
execution. (CVE-2007-1667)
Users of the X.org X11 server should upgrade to these updated
packages, which contain a backported patch and are not vulnerable to
this issue."
);
script_set_attribute(
attribute:"see_also",
value:"https://oss.oracle.com/pipermail/el-errata/2007-June/000232.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected libx11 and / or xorg-x11-apps packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(189);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:libX11");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:libX11-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:xorg-x11-apps");
script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:5");
script_set_attribute(attribute:"vuln_publication_date", value:"2007/03/24");
script_set_attribute(attribute:"patch_publication_date", value:"2007/06/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Oracle Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
os_ver = os_ver[1];
if (! preg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 5", "Oracle Linux " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
flag = 0;
if (rpm_check(release:"EL5", reference:"libX11-1.0.3-8.0.1.el5")) flag++;
if (rpm_check(release:"EL5", reference:"libX11-devel-1.0.3-8.0.1.el5")) flag++;
if (rpm_check(release:"EL5", reference:"xorg-x11-apps-7.1-4.0.1.el5")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libX11 / libX11-devel / xorg-x11-apps");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo