First published: Tue Mar 21 2006(Updated: )
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X11 Fonts Utilities | =1.0 | |
X11 Fonts Utilities | =1.0.1 | |
X11 Fonts Utilities | =6.9 | |
Mandrake Linux | =2006 | |
Mandrake Linux | =2006 | |
SUSE Linux | =10.0 | |
Red Hat Fedora Core | =core_5.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0745 is classified as a moderate severity vulnerability due to its potential to allow local users to execute arbitrary code.
To fix CVE-2006-0745, update the X.Org server to a version that has patched the vulnerability.
CVE-2006-0745 affects X.Org server versions 1.0.0 and later, X11R6.9.0, and X11R7.0, among others.
CVE-2006-0745 cannot be exploited remotely as it requires local user access to the system.
Local users on systems running affected versions of the X.Org server are at risk from CVE-2006-0745.