SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   X Vendors:   X.org
(Oracle Issues Fix for Oracle Linux) X.Org Command Line Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges and Delete Arbitrary Files
SecurityTracker Alert ID:  1042047
SecurityTracker URL:  http://securitytracker.com/id/1042047
CVE Reference:   CVE-2018-14665   (Links to External Site)
Date:  Nov 9 2018
Impact:   Denial of service via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.19 and later
Description:   A vulnerability was reported in X.Org. A remote authenticated user can gain elevated privileges and delete arbitrary files.

A remote authenticated user can exploit a command line validation flaw to specify a '-modulepath' argument with an insecure path to cause arbitrary code to be executed on the target system.

A remote authenticated user can also exploit a command line validation flaw in the '-logfile' argument to cause arbitrary files to be deleted on the target system.

These can be exploited on systems that have the X.org X server running with elevated privileges and started by a non-root users.

Narendra Shinde reported this vulnerability.

Impact:   A remote authenticated user can gain elevated privileges and delete arbitrary files on the target system.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2018-3410.html

Vendor URL:  linux.oracle.com/errata/ELSA-2018-3410.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Oct 25 2018 X.Org Command Line Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges and Delete Arbitrary Files



 Source Message Contents

Subject:  [El-errata] ELSA-2018-3410 Important: Oracle Linux 7 xorg-x11-server security update

Oracle Linux Security Advisory ELSA-2018-3410

http://linux.oracle.com/errata/ELSA-2018-3410.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
xorg-x11-server-Xdmx-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-Xephyr-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-Xnest-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-Xorg-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-Xvfb-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-Xwayland-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-common-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-devel-1.20.1-5.1.el7.i686.rpm
xorg-x11-server-devel-1.20.1-5.1.el7.x86_64.rpm
xorg-x11-server-source-1.20.1-5.1.el7.noarch.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/xorg-x11-server-1.20.1-5.1.el7.src.rpm



Description of changes:

[1.20.1-5.1]
- CVE-2018-14665: Disable -logfile and -modulepath when running with 
elevated
   privileges

[1.20.1-5]
- Call LeaveVT from xf86CrtcCloseScreen

[1.20.1-4]
- Hide the modesetting driver's atomic ioctl support behind Option "Atomic"


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC