Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.881361
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for xorg-x11-server-sdk CESA-2011:1359 centos5 x86_64
Zusammenfassung:The remote host is missing an update for the 'xorg-x11-server-sdk'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'xorg-x11-server-sdk'
package(s) announced via the referenced advisory.

Vulnerability Insight:
X.Org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

Multiple input sanitization flaws were found in the X.Org GLX (OpenGL
extension to the X Window System) extension. A malicious, authorized client
could use these flaws to crash the X.Org server or, potentially, execute
arbitrary code with root privileges. (CVE-2010-4818)

An input sanitization flaw was found in the X.Org Render extension. A
malicious, authorized client could use this flaw to leak arbitrary memory
from the X.Org server process, or possibly crash the X.Org server.
(CVE-2010-4819)

Users of xorg-x11-server should upgrade to these updated packages, which
contain backported patches to resolve these issues. All running X.Org
server instances must be restarted for this update to take effect.

Affected Software/OS:
xorg-x11-server-sdk on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
8.5

CVSS Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-4818
RHSA-2011:1359
http://rhn.redhat.com/errata/RHSA-2011-1359.html
RHSA-2011:1360
http://rhn.redhat.com/errata/RHSA-2011-1360.html
[oss-security] 20110922 CVE Request: Missing input sanitation in various X GLX calls
http://www.openwall.com/lists/oss-security/2011/09/22/7
[oss-security] 20110923 Re: CVE Request: Missing input sanitation in various X GLX calls
http://www.openwall.com/lists/oss-security/2011/09/23/4
http://www.openwall.com/lists/oss-security/2011/09/23/6
http://cgit.freedesktop.org/xorg/xserver/commit?id=3f0d3f4d97bce75c1828635c322b6560a45a037f
http://cgit.freedesktop.org/xorg/xserver/commit?id=6c69235a9dfc52e4b4e47630ff4bab1a820eb543
http://cgit.freedesktop.org/xorg/xserver/commit?id=ec9c97c6bf70b523bc500bd3adf62176f1bb33a4
https://bugs.freedesktop.org/show_bug.cgi?id=28823
https://bugzilla.redhat.com/show_bug.cgi?id=740954
Common Vulnerability Exposure (CVE) ID: CVE-2010-4819
1026149
http://securitytracker.com/id?1026149
[oss-security] 20110922 CVE Request: X.org ProcRenderGlyps input sanitation issue
http://www.openwall.com/lists/oss-security/2011/09/22/8
[oss-security] 20110923 Re: CVE Request: X.org ProcRenderGlyps input sanitation issue
http://www.openwall.com/lists/oss-security/2011/09/23/5
http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc
http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718
https://bugs.freedesktop.org/show_bug.cgi?id=28801
CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.