First published: Tue Mar 21 2006(Updated: )
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org X11r7 | =1.0 | |
X.org X11r7 | =1.0.1 | |
X.org X11r6 | =6.9 | |
Mandrakesoft Mandrake Linux | =2006 | |
Mandrakesoft Mandrake Linux | =2006 | |
Suse Suse Linux | =10.0 | |
Redhat Fedora Core | =core_5.0 | |
Sun Solaris | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.