Executive Summary
Summary | |
---|---|
Title | xorg-x11 security update |
Informations | |||
---|---|---|---|
Name | RHSA-2011:1360 | First vendor Publication | 2011-10-06 |
Vendor | RedHat | Last vendor Modification | 2011-10-06 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.5 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated xorg-x11 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Multiple input sanitization flaws were found in the X.Org GLX (OpenGL extension to the X Window System) extension. A malicious, authorized client could use these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2010-4818) An input sanitization flaw was found in the X.Org Render extension. A malicious, authorized client could use this flaw to leak arbitrary memory from the X.Org server process, or possibly crash the X.Org server. (CVE-2010-4819) Users of xorg-x11 should upgrade to these updated packages, which contain a backported patch to resolve these issues. All running X.Org server instances must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 740954 - CVE-2010-4818 X.org: multiple GLX input sanitization flaws 740961 - CVE-2010-4819 X.org: ProcRenderAddGlyphs input sanitization flaw |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2011-1360.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20916 | |||
Oval ID: | oval:org.mitre.oval:def:20916 | ||
Title: | Memory leak vulnerability in AIX X-server | ||
Description: | The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-4819 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 | |
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for xorg-x11-server-sdk CESA-2011:1359 centos5 x86_64 File : nvt/gb_CESA-2011_1359_xorg-x11-server-sdk_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for xorg-x11 CESA-2011:1360 centos4 x86_64 File : nvt/gb_CESA-2011_1360_xorg-x11_centos4_x86_64.nasl |
2011-11-11 | Name : CentOS Update for xorg-x11 CESA-2011:1360 centos4 i386 File : nvt/gb_CESA-2011_1360_xorg-x11_centos4_i386.nasl |
2011-10-21 | Name : Ubuntu Update for xorg-server USN-1232-1 File : nvt/gb_ubuntu_USN_1232_1.nasl |
2011-10-21 | Name : Ubuntu Update for xorg-server USN-1232-2 File : nvt/gb_ubuntu_USN_1232_2.nasl |
2011-10-21 | Name : Ubuntu Update for xorg-server USN-1232-3 File : nvt/gb_ubuntu_USN_1232_3.nasl |
2011-10-10 | Name : CentOS Update for xorg-x11-server-sdk CESA-2011:1359 centos5 i386 File : nvt/gb_CESA-2011_1359_xorg-x11-server-sdk_centos5_i386.nasl |
2011-10-10 | Name : RedHat Update for xorg-x11-server RHSA-2011:1359-01 File : nvt/gb_RHSA-2011_1359-01_xorg-x11-server.nasl |
2011-10-10 | Name : RedHat Update for xorg-x11 RHSA-2011:1360-01 File : nvt/gb_RHSA-2011_1360-01_xorg-x11.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
77300 | X.Org X Server ProcRenderAddGlyphs() Local Memory Disclosure |
77299 | X.Org X Server GLX Call Parsing Remote Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_xorg-x11-Xvnc-120207.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-13.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1359.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1360.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111006_xorg_x11_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111006_xorg_x11_server_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-02-28 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xorg-x11-7954.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_xorg-x11-server-libs-111010.nasl - Type : ACT_GATHER_INFO |
2011-11-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1360.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1232-3.nasl - Type : ACT_GATHER_INFO |
2011-10-20 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1232-2.nasl - Type : ACT_GATHER_INFO |
2011-10-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1232-1.nasl - Type : ACT_GATHER_INFO |
2011-10-07 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1359.nasl - Type : ACT_GATHER_INFO |
2011-10-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1359.nasl - Type : ACT_GATHER_INFO |
2011-10-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1360.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:55:11 |
|