6.8 Medium
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
23.3%
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.
CPE | Name | Operator | Version |
---|---|---|---|
mandrake_linux | eq | 2006 | |
mandrake_linux | eq | 2006 x86-64 | |
fedora_core | eq | core-5.0 | |
solaris | eq | 10.0 x86 | |
suse_linux | eq | 10.0 oss | |
x11r6 | eq | 6.9 | |
x11r7 | eq | 1.0 | |
x11r7 | eq | 1.0.1 |
secunia.com/advisories/19256
secunia.com/advisories/19307
secunia.com/advisories/19311
secunia.com/advisories/19316
secunia.com/advisories/19676
securityreason.com/securityalert/606
securitytracker.com/id?1015793
sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1
support.avaya.com/elmodocs2/security/ASA-2006-078.htm
www.mandriva.com/security/advisories?name=MDKSA-2006:056
www.novell.com/linux/security/advisories/2006_16_xorgx11server.html
www.osvdb.org/24000
www.osvdb.org/24001
www.redhat.com/archives/fedora-announce-list/2006-March/msg00026.html
www.securityfocus.com/archive/1/428183/100/0/threaded
www.securityfocus.com/archive/1/428230/100/0/threaded
www.securityfocus.com/bid/17169
www.vupen.com/english/advisories/2006/1017
www.vupen.com/english/advisories/2006/1028
exchange.xforce.ibmcloud.com/vulnerabilities/25341
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1697