Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56633
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2006:0451
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0451.

X.org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces such as GNOME and KDE are designed upon.

A buffer overflow flaw in the X.org server RENDER extension was discovered.
A malicious authorized client could exploit this issue to cause a denial of
service (crash) or potentially execute arbitrary code with root privileges
on the X.org server. (CVE-2006-1526)

Users of X.org should upgrade to these updated packages, which contain a
backported patch and is not vulnerable to this issue.

This issue does not affect Red Hat Enterprise Linux 2.1 or 3.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0451.html
http://lists.freedesktop.org/archives/xorg/2006-May/015136.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : Medium

CVSS Score:
2.1

Referencia Cruzada: BugTraq ID: 17795
Common Vulnerability Exposure (CVE) ID: CVE-2006-1526
1016018
http://securitytracker.com/id?1016018
102339
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102339-1
17795
http://www.securityfocus.com/bid/17795
19900
http://secunia.com/advisories/19900
19915
http://secunia.com/advisories/19915
19916
http://secunia.com/advisories/19916
19921
http://secunia.com/advisories/19921
19943
http://secunia.com/advisories/19943
19951
http://secunia.com/advisories/19951
19956
http://secunia.com/advisories/19956
19983
http://secunia.com/advisories/19983
2006-0024
http://www.trustix.org/errata/2006/0024
ADV-2006-1617
http://www.vupen.com/english/advisories/2006/1617
FLSA:190777
http://www.securityfocus.com/archive/1/436327/100/0/threaded
GLSA-200605-02
http://www.gentoo.org/security/en/glsa/glsa-200605-02.xml
MDKSA-2006:081
http://www.mandriva.com/security/advisories?name=MDKSA-2006:081
RHSA-2006:0451
http://www.redhat.com/support/errata/RHSA-2006-0451.html
SUSE-SA:2006:023
http://www.novell.com/linux/security/advisories/2006_05_03.html
USN-280-1
https://usn.ubuntu.com/280-1/
VU#633257
http://www.kb.cert.org/vuls/id/633257
[3.8] 007: SECURITY FIX: May 2, 2006
http://www.openbsd.org/errata38.html#xorg
[xorg] 20060502 [CVE-2006-1525] X.Org security advisory: Buffer overflow in the Xrender extension
http://lists.freedesktop.org/archives/xorg/2006-May/015136.html
https://bugs.freedesktop.org/show_bug.cgi?id=6642
oval:org.mitre.oval:def:9929
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9929
xorg-xrender-bo(26200)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26200
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.