First published: Wed Feb 05 2014(Updated: )
The X.Org X wrapper (xserver-wrapper.c) in Debian GNU/Linux and Ubuntu Linux does not properly verify the TTY of a user who is starting X, which allows local users to bypass intended access restrictions by associating stdin with a file that is misinterpreted as the console TTY.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org Xserver | ||
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =11.10 | |
Debian GNU/Linux | ||
Ubuntu | ||
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Debian | ||
Ubuntu | =11.10 | |
Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4613 is classified as a moderate severity vulnerability.
To fix CVE-2011-4613, ensure you update the X.Org X server to the latest version provided by your Linux distribution.
CVE-2011-4613 affects Debian GNU/Linux and specific versions of Ubuntu Linux including 10.04, 10.10, 11.04, and 11.10.
CVE-2011-4613 is a local privilege escalation vulnerability that can be exploited by local users.
Yes, if not patched, CVE-2011-4613 allows local users to bypass access restrictions which can lead to unauthorized access.