Overview
A vulnerability in the X.Org server could allow a local attacker to gain administrative privileges or cause a denial of service on an affected system.
Description
The X.Org server program provides several command-line options that are meant to be parsed only when the program is running as root. These include -modulepath, which specifies the location from which to load modules providing server functionality, and -logfile, which specifies the location of the server log file. Normally, these options cannot be changed by unprivileged users. A flaw exists in the way that the server enforces this restriction because it evaluates the address of the geteuid function instead of the result of executing the function (i.e., "geteuid" versus "geteuid()"). This test is flawed because the address of geteuid is guaranteed to be nonzero. As a result, an unprivileged user can load modules from any location on the file system with root privileges or overwrite critical system files with the server log. |
Impact
If the X.Org server program is setuid to root, as is typically the case, an authenticated local attacker can execute code or overwrite system files with administrative privileges on an affected system. |
Solution
Apply a patch from the vendor |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://lists.freedesktop.org/archives/xorg/2006-March/013858.html
- http://www.securityfocus.com/bid/17169
- http://frontal2.mandriva.com/security/advisories?name=MDKSA-2006:056
- http://secunia.com/advisories/19256/
- http://secunia.com/advisories/19311/
- http://secunia.com/advisories/19316/
- http://secunia.com/advisories/19307/
- http://www.auscert.org.au/6142
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1
- http://www.auscert.org.au/6142
Acknowledgements
Thanks to the X.Org Foundation for reporting this vulnerability. They, in turn, credit Coverity with discovering and reporting this vulnerability to them.
This document was written by Chad R Dougherty.
Other Information
CVE IDs: | CVE-2006-0745 |
Severity Metric: | 18.44 |
Date Public: | 2006-03-20 |
Date First Published: | 2006-08-16 |
Date Last Updated: | 2009-11-20 19:16 UTC |
Document Revision: | 17 |