SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xdm Vendors:   XFree86 Project
(OpenBSD Issues Fix) Xdm May Open Random TCP Sockets
SecurityTracker Alert ID:  1010308
SecurityTracker URL:  http://securitytracker.com/id/1010308
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 27 2004
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in xdm. The software may open random TCP sockets.

Steve Rumble reported that xdm opens a chooserFd TCP socket even when DisplayManager.requestPort is set to 0.

The flaw resides in 'xc/programs/xdm/socket.c'.

Impact:   The software may open random TCP ports.
Solution:   OpenBSD has issued a patch:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/008_xdm.patch

Vendor URL:  bugs.xfree86.org/show_bug.cgi?id=1376 (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  UNIX (OpenBSD)
Underlying OS Comments:  3.5

Message History:   This archive entry is a follow-up to the message listed below.
May 27 2004 Xdm May Open Random TCP Sockets



 Source Message Contents

Subject:  OpenBSD xdm security fix


 > 008: SECURITY FIX: May 26, 2004
 > With the introduction of IPv6 code in xdm(1), one test on the'requestPort' resource was 
 > deleted by accident. This makes xdm create the chooser socket even if xdmcp is disabled 
 > in xdm-config, by setting requestPort to 0. See XFree86 bugzilla for details.
 > A source code patch exists which remedies this problem.

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/008_xdm.patch




 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC