Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.70305
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2011:1360
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates announced in
advisory RHSA-2011:1360.

X.Org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

Multiple input sanitization flaws were found in the X.Org GLX (OpenGL
extension to the X Window System) extension. A malicious, authorized client
could use these flaws to crash the X.Org server or, potentially, execute
arbitrary code with root privileges. (CVE-2010-4818)

An input sanitization flaw was found in the X.Org Render extension. A
malicious, authorized client could use this flaw to leak arbitrary memory
from the X.Org server process, or possibly crash the X.Org server.
(CVE-2010-4819)

Users of xorg-x11 should upgrade to these updated packages, which contain a
backported patch to resolve these issues. All running X.Org server
instances must be restarted for this update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2011-1360.html

Risk factor : Medium

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-4818
RHSA-2011:1359
http://rhn.redhat.com/errata/RHSA-2011-1359.html
RHSA-2011:1360
http://rhn.redhat.com/errata/RHSA-2011-1360.html
[oss-security] 20110922 CVE Request: Missing input sanitation in various X GLX calls
http://www.openwall.com/lists/oss-security/2011/09/22/7
[oss-security] 20110923 Re: CVE Request: Missing input sanitation in various X GLX calls
http://www.openwall.com/lists/oss-security/2011/09/23/4
http://www.openwall.com/lists/oss-security/2011/09/23/6
http://cgit.freedesktop.org/xorg/xserver/commit?id=3f0d3f4d97bce75c1828635c322b6560a45a037f
http://cgit.freedesktop.org/xorg/xserver/commit?id=6c69235a9dfc52e4b4e47630ff4bab1a820eb543
http://cgit.freedesktop.org/xorg/xserver/commit?id=ec9c97c6bf70b523bc500bd3adf62176f1bb33a4
https://bugs.freedesktop.org/show_bug.cgi?id=28823
https://bugzilla.redhat.com/show_bug.cgi?id=740954
Common Vulnerability Exposure (CVE) ID: CVE-2010-4819
1026149
http://securitytracker.com/id?1026149
[oss-security] 20110922 CVE Request: X.org ProcRenderGlyps input sanitation issue
http://www.openwall.com/lists/oss-security/2011/09/22/8
[oss-security] 20110923 Re: CVE Request: X.org ProcRenderGlyps input sanitation issue
http://www.openwall.com/lists/oss-security/2011/09/23/5
http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc
http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718
https://bugs.freedesktop.org/show_bug.cgi?id=28801
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.