Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.70817
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 201201-16 (xkeyboard-config xorg-server)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 201201-16.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 201201-16.

Vulnerability Insight:
A debugging functionality in the X.Org X Server that is bound to a
hotkey by default can be used by local attackers to circumvent screen
locking utilities.

Solution:
All xkeyboard-config users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-misc/xkeyboard-config-2.4.1-r3'


NOTE: The X.Org X Server 1.11 was only stable on the AMD64, ARM, HPPA,
and x86 architectures. Users of the stable branches of all other
architectures are not affected and will be directly provided with a
fixed
X Keyboard Configuration Database version.

CVSS Score:
4.6

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-0064
1026549
http://securitytracker.com/id?1026549
78445
http://www.osvdb.org/78445
[oss-security] 20120118 Re: Screen locking programs on Xorg 1.11
http://www.openwall.com/lists/oss-security/2012/01/19/6
[xorg-announce] 20120119 xkeyboard-config 2.5
http://lists.x.org/archives/xorg-announce/2012-January/001797.html
[xorg-devel] 20120119 [PATCH SECURITY] XKB: Workaround for CVE-2012-0064: Stop calling UngrabAllDevices().
http://lists.x.org/archives/xorg-devel/2012-January/028691.html
http://gu1.aeroxteam.fr/2012/01/19/bypass-screensaver-locker-program-xorg-111-and-up/
http://who-t.blogspot.com/2012/01/xkb-breaking-grabs-cve-2012-0064.html
http://www.x.org/wiki/Development/Security/
https://bugzilla.redhat.com/show_bug.cgi?id=783039
CopyrightCopyright (C) 2012 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.