Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2021.0573
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2021-0573)
Resumen:The remote host is missing an update for the 'x11-server' package(s) announced via the MGASA-2021-0573 advisory.
Descripción:Summary:
The remote host is missing an update for the 'x11-server' package(s) announced via the MGASA-2021-0573 advisory.

Vulnerability Insight:
Updated x11-server packages fix security vulnerabilities:

The handler for the CompositeGlyphs request of the Render extension does
not properly validate the request length leading to out of bounds memory
write (CVE-2021-4008).

The handler for the CreatePointerBarrier request of the XFixes extension
does not properly validate the request length leading to out of bounds
memory write (CVE-2021-4009).

The handler for the Suspend request of the Screen Saver extension does
not properly validate the request length leading to out of bounds memory
write (CVE-2021-4010).

The handlers for the RecordCreateContext and RecordRegisterClients
requests of the Record extension do not properly validate the request
length leading to out of bounds memory write (CVE-2021-4011).

All of these issues can lead to local privileges elevation on systems
where the X server is running privileged and remote code execution for
ssh X forwarding sessions.

Affected Software/OS:
'x11-server' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-4008
Debian Security Information: DSA-5027 (Google Search)
https://www.debian.org/security/2021/dsa-5027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/
https://security.gentoo.org/glsa/202305-30
https://www.zerodayinitiative.com/advisories/ZDI-21-1547/
https://lists.x.org/archives/xorg-announce/2021-December/003122.html
https://lists.x.org/archives/xorg-announce/2021-December/003124.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-4009
https://www.zerodayinitiative.com/advisories/ZDI-21-1548/
Common Vulnerability Exposure (CVE) ID: CVE-2021-4010
https://www.zerodayinitiative.com/advisories/ZDI-21-1549/
Common Vulnerability Exposure (CVE) ID: CVE-2021-4011
https://www.zerodayinitiative.com/advisories/ZDI-21-1550/
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.