Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.55341
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2005:164 (XFree86)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to XFree86
announced via advisory MDKSA-2005:164.

A vulnerability was discovered in the pixmap allocation handling of the
X server that can lead to local privilege escalation. By allocating a
huge pixmap, a local user could trigger an integer overflow that
resulted in a memory allocation that was too small for the requested
pixmap, leading to a buffer overflow which could then be exploited to
execute arbitrary code with full root privileges.

The updated packages have been patched to address these issues.

Affected versions: 10.0, 10.1, 10.2, Corporate 3.0,
Corporate Server 2.1


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2005:164

Risk factor : High

CVSS Score:
5.1

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-2495
1014887
http://securitytracker.com/id?1014887
101926
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1
101953
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1
14807
http://www.securityfocus.com/bid/14807
16777
http://secunia.com/advisories/16777
16790
http://secunia.com/advisories/16790
17044
http://secunia.com/advisories/17044
17215
http://secunia.com/advisories/17215
17258
http://secunia.com/advisories/17258
17278
http://secunia.com/advisories/17278
19352
http://www.osvdb.org/19352
19624
http://secunia.com/advisories/19624
19796
http://secunia.com/advisories/19796
2005-0049
http://marc.info/?l=bugtraq&m=112690609622266&w=2
20060403-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
21318
http://secunia.com/advisories/21318
ADV-2006-3140
http://www.vupen.com/english/advisories/2006/3140
DSA-816
http://www.debian.org/security/2005/dsa-816
FEDORA-2005-893
http://www.securityfocus.com/advisories/9285
FEDORA-2005-894
http://www.securityfocus.com/advisories/9286
FLSA:168264-2
http://www.securityfocus.com/archive/1/427045/100/0/threaded
GLSA-200509-07
http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml
HPSBUX02137
http://www.securityfocus.com/archive/1/442163/100/0/threaded
MDKSA-2005:164
http://www.mandriva.com/security/advisories?name=MDKSA-2005:164
RHSA-2005:329
http://www.redhat.com/support/errata/RHSA-2005-329.html
RHSA-2005:396
http://www.redhat.com/support/errata/RHSA-2005-396.html
RHSA-2005:501
http://www.redhat.com/support/errata/RHSA-2005-501.html
SCOSA-2006.22
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt
SSRT051024
SUSE-SA:2005:056
http://www.novell.com/linux/security/advisories/2005_56_xserver.html
SUSE-SR:2005:023
http://www.novell.com/linux/security/advisories/2005_23_sr.html
USN-182-1
https://www.ubuntu.com/usn/usn-182-1/
VU#102441
http://www.kb.cert.org/vuls/id/102441
http://support.avaya.com/elmodocs2/security/ASA-2005-218.pdf
http://support.avaya.com/elmodocs2/security/ASA-2005-226.pdf
oval:org.mitre.oval:def:1044
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044
oval:org.mitre.oval:def:9615
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615
oval:org.mitre.oval:def:998
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998
xorg-pixmap-bo(22244)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22244
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.