SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   X Vendors:   X.org
(OpenBSD Issues Fix) X Memory Corruption Error in SProcSecurity Functions Lets Local Users and Remote Authenticated Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020526
SecurityTracker URL:  http://securitytracker.com/id/1020526
CVE Reference:   CVE-2008-1377   (Links to External Site)
Date:  Jul 18 2008
Impact:   Execution of arbitrary code via network, Root access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): X11R7.3
Description:   A vulnerability was reported in the X Windows System. A remote authenticated user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

A remote authenticated user can send specially crafted data to trigger a memory corruption error in the SProcSecurityGenerateAuthorization(), SProcRecordCreateContext(), and SProcRecordRegisterClients() functions and execute arbitrary code on the target X server. The code will run with the privileges of the target server (which may be root privileges on many systems).

A local user can execute arbitrary commands on the target system with elevated privileges.

The RECORD and Security Extensions are affected.

The vendor was notified on March 26, 2008.

regenrecht reported this vulnerability via iDefense.

Impact:   A remote authenticated user can execute arbitrary code on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   OpenBSD has issued the following patches:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/012_xorg2.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/003_xorg.patch

The OpenBSD advisories are available at:

http://www.openbsd.org/errata42.html
http://www.openbsd.org/errata43.html

Vendor URL:  x.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (OpenBSD)
Underlying OS Comments:  4.2, 4.3

Message History:   This archive entry is a follow-up to the message listed below.
Jun 11 2008 X Memory Corruption Error in SProcSecurity Functions Lets Local Users and Remote Authenticated Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC