Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 1466-2 (xorg-server, libxfont, xfree86)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to xorg-server, libxfont, xfree86 announced via advisory DSA 1466-2.

Insight

Insight

The X.org fix for CVE-2007-6429 introduced a regression in the MIT-SHM extension, which prevented the start of a few applications. This update fixes this problem and also references the patch for CVE-2008-0006, which was included in the previous update, but not mentioned in the advisory text. Several local vulnerabilities have been discovered in the X.Org X server. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5760 regenrecht discovered that missing input sanitising within the XFree86-Misc extension may lead to local privilege escalation. CVE-2007-5958 It was discovered that error messages of security policy file handling may lead to a minor information leak disclosing the existence of files otherwise unaccessible to the user. CVE-2007-6427 regenrecht discovered that missing input sanitising within the XInput-Misc extension may lead to local privilege escalation. CVE-2007-6428 regenrecht discovered that missing input sanitising within the TOG-CUP extension may lead to disclosure of memory contents. CVE-2007-6429 regenrecht discovered that integer overflows in the EVI and MIT-SHM extensions may lead to local privilege escalation. CVE-2008-0006 It was discovered that insufficient validation of PCF fonts could lead to local privilege escalation. For the unstable distribution (sid), this problem has been fixed in version 2:1.4.1~git20080118-1 of xorg-server and version 1:1.3.1-2 of libxfont. For the stable distribution (etch), this problem has been fixed in version 1.1.1-21etch3 or xorg-server and 1.2.2-2.etch1 of libxfont. For the oldstable distribution (etch), this problem has been fixed in version 4.3.0.dfsg.1-14sarge6 of xfree86. We recommend that you upgrade your libxfont abd xorg-server packages.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201466-2