CVE
- Id
- 16849
- CVE No.
- CVE-2006-0745
- Status
- Candidate
- Description
- X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.
- Phase
- Assigned (20060217)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
136887 | 16849 | CVE-2006-0745 | BUGTRAQ:20060320 [CVE-2006-0745] X.Org Security Advisory: privilege escalation and DoS in X11R6.9, X11R7.0 | View |
136888 | 16849 | CVE-2006-0745 | URL:http://www.securityfocus.com/archive/1/archive/1/428183/100/0/threaded | View |
136889 | 16849 | CVE-2006-0745 | BUGTRAQ:20060320 Re: [CVE-2006-0745] X.Org Security Advisory: privilege escalation and DoS in X11R6.9, X11R7.0 | View |
136890 | 16849 | CVE-2006-0745 | URL:http://www.securityfocus.com/archive/1/archive/1/428230/100/0/threaded | View |
136891 | 16849 | CVE-2006-0745 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm | View |
136892 | 16849 | CVE-2006-0745 | FEDORA:FEDORA-2006-172 | View |
136893 | 16849 | CVE-2006-0745 | URL:http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00026.html | View |
136894 | 16849 | CVE-2006-0745 | MANDRIVA:MDKSA-2006:056 | View |
136895 | 16849 | CVE-2006-0745 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:056 | View |
136896 | 16849 | CVE-2006-0745 | SUNALERT:102252 | View |
136897 | 16849 | CVE-2006-0745 | URL:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 | View |
136898 | 16849 | CVE-2006-0745 | SUSE:SUSE-SA:2006:016 | View |
136899 | 16849 | CVE-2006-0745 | URL:http://www.novell.com/linux/security/advisories/2006_16_xorgx11server.html | View |
136900 | 16849 | CVE-2006-0745 | BID:17169 | View |
136901 | 16849 | CVE-2006-0745 | URL:http://www.securityfocus.com/bid/17169 | View |
136902 | 16849 | CVE-2006-0745 | VUPEN:ADV-2006-1017 | View |
136903 | 16849 | CVE-2006-0745 | URL:http://www.vupen.com/english/advisories/2006/1017 | View |
136904 | 16849 | CVE-2006-0745 | VUPEN:ADV-2006-1028 | View |
136905 | 16849 | CVE-2006-0745 | URL:http://www.vupen.com/english/advisories/2006/1028 | View |
136906 | 16849 | CVE-2006-0745 | OSVDB:24000 | View |
136907 | 16849 | CVE-2006-0745 | URL:http://www.osvdb.org/24000 | View |
136908 | 16849 | CVE-2006-0745 | OSVDB:24001 | View |
136909 | 16849 | CVE-2006-0745 | URL:http://www.osvdb.org/24001 | View |
136910 | 16849 | CVE-2006-0745 | OVAL:oval:org.mitre.oval:def:1697 | View |
136911 | 16849 | CVE-2006-0745 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1697 | View |
136912 | 16849 | CVE-2006-0745 | SECTRACK:1015793 | View |
136913 | 16849 | CVE-2006-0745 | URL:http://securitytracker.com/id?1015793 | View |
136914 | 16849 | CVE-2006-0745 | SECUNIA:19311 | View |
136915 | 16849 | CVE-2006-0745 | URL:http://secunia.com/advisories/19311 | View |
136916 | 16849 | CVE-2006-0745 | SECUNIA:19256 | View |
136917 | 16849 | CVE-2006-0745 | URL:http://secunia.com/advisories/19256 | View |
136918 | 16849 | CVE-2006-0745 | SECUNIA:19307 | View |
136919 | 16849 | CVE-2006-0745 | URL:http://secunia.com/advisories/19307 | View |
136920 | 16849 | CVE-2006-0745 | SECUNIA:19316 | View |
136921 | 16849 | CVE-2006-0745 | URL:http://secunia.com/advisories/19316 | View |
136922 | 16849 | CVE-2006-0745 | SECUNIA:19676 | View |
136923 | 16849 | CVE-2006-0745 | URL:http://secunia.com/advisories/19676 | View |
136924 | 16849 | CVE-2006-0745 | SREASON:606 | View |
136925 | 16849 | CVE-2006-0745 | URL:http://securityreason.com/securityalert/606 | View |
136926 | 16849 | CVE-2006-0745 | XF:xorg-geteuid-privilege-escalation(25341) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
58098 | JVNDB-2006-000294 | FreeType における奇数の値を持つフォントファイルによる整数アンダーフローの脆弱性 | FreeType には、pshinter/pshglob.c において青を表す値の処理に不備が存在し、値が奇数となっているフォントを処理した場合に整数アンダーフローが発生する脆弱性が存在します。 | CVE-2006-0747 | 16849 | 5 | http://jvndb.jvn.jp/ja/contents/2006/JVNDB-2006-000294.html | View |