Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.1.2007.1249
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1249-1)
Summary:The remote host is missing an update for the Debian 'xfree86' package(s) announced via the DSA-1249-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'xfree86' package(s) announced via the DSA-1249-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the X Window System, which may lead to privilege escalation or denial of service. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-6101

Sean Larsson discovered an integer overflow in the Render extension, which might lead to denial of service or local privilege escalation.

CVE-2006-6102

Sean Larsson discovered an integer overflow in the DBE extension, which might lead to denial of service or local privilege escalation.

CVE-2006-6103

Sean Larsson discovered an integer overflow in the DBE extension, which might lead to denial of service or local privilege escalation.

For the stable distribution (sarge) these problems have been fixed in version 4.3.0.dfsg.1-14sarge3. This update lacks builds for the Motorola 680x0 architecture, which had build problems. Packages will be released once this problem has been resolved.

For the upcoming stable distribution (etch) these problems have been fixed in version 2:1.1.1-15 of xorg-server.

For the unstable distribution (sid) these problems have been fixed in version 2:1.1.1-15 of xorg-server.

We recommend that you upgrade your XFree86 packages.

Affected Software/OS:
'xfree86' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-6101
1017495
http://securitytracker.com/id?1017495
102803
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
20070109 Multiple Vendor X Server Render Extension ProcRenderAddGlyphs Memory Corruption Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=463
21968
http://www.securityfocus.com/bid/21968
23633
http://secunia.com/advisories/23633
23670
http://secunia.com/advisories/23670
23684
http://secunia.com/advisories/23684
23689
http://secunia.com/advisories/23689
23698
http://secunia.com/advisories/23698
23705
http://secunia.com/advisories/23705
23758
http://secunia.com/advisories/23758
23789
http://secunia.com/advisories/23789
23966
http://secunia.com/advisories/23966
24168
http://secunia.com/advisories/24168
24210
http://secunia.com/advisories/24210
24247
http://secunia.com/advisories/24247
24401
http://secunia.com/advisories/24401
25802
http://secunia.com/advisories/25802
32084
http://osvdb.org/32084
ADV-2007-0108
http://www.vupen.com/english/advisories/2007/0108
ADV-2007-0109
http://www.vupen.com/english/advisories/2007/0109
ADV-2007-0589
http://www.vupen.com/english/advisories/2007/0589
ADV-2007-0669
http://www.vupen.com/english/advisories/2007/0669
ADV-2007-2233
http://www.vupen.com/english/advisories/2007/2233
DSA-1249
https://www.debian.org/security/2007/dsa-1249
GLSA-200701-25
http://security.gentoo.org/glsa/glsa-200701-25.xml
HPSBUX02225
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
MDKSA-2007:005
http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
NetBSD-SA2007-002
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
RHSA-2007:0002
http://www.redhat.com/support/errata/RHSA-2007-0002.html
RHSA-2007:0003
http://www.redhat.com/support/errata/RHSA-2007-0003.html
SSA:2007-066-02
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
SSRT071295
SUSE-SA:2007:008
http://www.novell.com/linux/security/advisories/2007_08_x.html
USN-403-1
http://www.ubuntu.com/usn/usn-403-1
[x-org announce] 20070109 X.Org Security Advisory: multiple integer overflows in dbe and render extensions
http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
https://issues.rpath.com/browse/RPL-920
oval:org.mitre.oval:def:10490
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10490
xorg-xserver-render-overflow(31337)
https://exchange.xforce.ibmcloud.com/vulnerabilities/31337
Common Vulnerability Exposure (CVE) ID: CVE-2006-6102
20070109 Multiple Vendor X Server DBE Extension ProcDbeGetVisualInfo Memory Corruption Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=464
32085
http://osvdb.org/32085
oval:org.mitre.oval:def:9991
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991
xorg-xserver-dbe-overflow(31376)
https://exchange.xforce.ibmcloud.com/vulnerabilities/31376
Common Vulnerability Exposure (CVE) ID: CVE-2006-6103
20070109 Multiple Vendor X Server DBE Extension ProcDbeSwapBuffers Memory Corruption Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465
32086
http://osvdb.org/32086
oval:org.mitre.oval:def:11011
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011
xorg-xserver-dbe-swap-overflow(31379)
https://exchange.xforce.ibmcloud.com/vulnerabilities/31379
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.