First published: Sun Mar 21 1999(Updated: )
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XFree86 X Server | =3.3.3 | |
NetBSD current | =1.3.2 | |
NetBSD current | =1.3.3 | |
Red Hat Linux | =5.1 | |
Red Hat Linux | =5.2 | |
Slackware Linux | =3.3 | |
Slackware Linux | =3.4 | |
Slackware Linux | =3.5 | |
Slackware Linux | =3.6 | |
Slackware Linux | =4.0 | |
SUSE Linux | =5.1 | |
SUSE Linux | =5.2 | |
SUSE Linux | =6.0 | |
SUSE Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0433 is considered a moderate severity vulnerability due to the potential for local privilege escalation.
To fix CVE-1999-0433, it is recommended to update XFree86 to a version that does not exhibit the symlink vulnerability.
CVE-1999-0433 affects several versions of XFree86 and various distributions of Linux including NetBSD and Red Hat.
Yes, CVE-1999-0433 can allow local users to create files in restricted directories, potentially leading to system compromise or denial of service.
A potential workaround for CVE-1999-0433 includes restricting user permissions on directories that may be susceptible to symlink attacks.