Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55327
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:501
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:501.

XFree86 is an implementation of the X Window System, which provides
the core functionality for the Linux graphical desktop.

Several integer overflow bugs were found in the way XFree86 parses pixmap
images. It is possible for a user to gain elevated privileges by loading a
specially crafted pixmap image. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-2495 to this issue.

Additionally this update adds the following new features in this release:
- - Support for ATI RN50/ES1000 chipsets has been added.

The following bugs were also fixed in this release:
- - A problem with the X server's module loading system that led to cache
incoherency on the Itanium architecture.

- - The X server's PCI config space accesses caused contention
with the kernel if accesses occurred while the kernel lock was held.

- - X font server (xfs) crashed when accessing Type 1 fonts
via showfont.

- - A problem with the X transport library prevented X applications
from starting if the hostname started with a digit.

- - An issue where refresh rates were being restricted to 60Hz on
some Intel i8xx systems

Users of XFree86 should upgrade to these updated packages, which contain a
backported patch and are not vulnerable to this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-501.html

Risk factor : High

CVSS Score:
5.1

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-2495
1014887
http://securitytracker.com/id?1014887
101926
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1
101953
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1
14807
http://www.securityfocus.com/bid/14807
16777
http://secunia.com/advisories/16777
16790
http://secunia.com/advisories/16790
17044
http://secunia.com/advisories/17044
17215
http://secunia.com/advisories/17215
17258
http://secunia.com/advisories/17258
17278
http://secunia.com/advisories/17278
19352
http://www.osvdb.org/19352
19624
http://secunia.com/advisories/19624
19796
http://secunia.com/advisories/19796
2005-0049
http://marc.info/?l=bugtraq&m=112690609622266&w=2
20060403-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
21318
http://secunia.com/advisories/21318
ADV-2006-3140
http://www.vupen.com/english/advisories/2006/3140
DSA-816
http://www.debian.org/security/2005/dsa-816
FEDORA-2005-893
http://www.securityfocus.com/advisories/9285
FEDORA-2005-894
http://www.securityfocus.com/advisories/9286
FLSA:168264-2
http://www.securityfocus.com/archive/1/427045/100/0/threaded
GLSA-200509-07
http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml
HPSBUX02137
http://www.securityfocus.com/archive/1/442163/100/0/threaded
MDKSA-2005:164
http://www.mandriva.com/security/advisories?name=MDKSA-2005:164
RHSA-2005:329
http://www.redhat.com/support/errata/RHSA-2005-329.html
RHSA-2005:396
http://www.redhat.com/support/errata/RHSA-2005-396.html
RHSA-2005:501
http://www.redhat.com/support/errata/RHSA-2005-501.html
SCOSA-2006.22
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt
SSRT051024
SUSE-SA:2005:056
http://www.novell.com/linux/security/advisories/2005_56_xserver.html
SUSE-SR:2005:023
http://www.novell.com/linux/security/advisories/2005_23_sr.html
USN-182-1
https://www.ubuntu.com/usn/usn-182-1/
VU#102441
http://www.kb.cert.org/vuls/id/102441
http://support.avaya.com/elmodocs2/security/ASA-2005-218.pdf
http://support.avaya.com/elmodocs2/security/ASA-2005-226.pdf
oval:org.mitre.oval:def:1044
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1044
oval:org.mitre.oval:def:9615
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9615
oval:org.mitre.oval:def:998
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A998
xorg-pixmap-bo(22244)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22244
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.