Vulnerabilities > CVE-2004-0419
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
OS | 1 |
Nessus
NASL family FreeBSD Local Security Checks NASL id FREEBSD_XORGS_CLIENTS_670.NASL description The following package needs to be updated: xorg-clients last seen 2016-09-26 modified 2004-07-06 plugin id 12628 published 2004-07-06 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=12628 title FreeBSD : XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0 (210) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_FF00F2CEC54C11D8B70800061BC2AD93.NASL description When the IPv6 code was added to xdm a critical test to disable xdmcp was accidentally removed. This caused xdm to create the chooser socket regardless if DisplayManager.requestPort was disabled in xdm-config or not. last seen 2020-06-01 modified 2020-06-02 plugin id 38133 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38133 title FreeBSD : XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0 (ff00f2ce-c54c-11d8-b708-00061bc2ad93) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2004-073.NASL description Steve Rumble discovered XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions. The updated packages are patched to correct the problem. last seen 2020-06-01 modified 2020-06-02 plugin id 14171 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14171 title Mandrake Linux Security Advisory : XFree86 (MDKSA-2004:073) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2004-478.NASL description Updated XFree86 packages that fix several security flaws in libXpm, as well as other bugs, are now available for Red Hat Enterprise Linux 3. XFree86 is an open source implementation of the X Window System. It provides the basic low level functionality which full fledged graphical user interfaces (GUIs) such as GNOME and KDE are designed upon. During a source code audit, Chris Evans discovered several stack overflow flaws and an integer overflow flaw in the X.Org libXpm library used to decode XPM (X PixMap) images. An attacker could create a carefully crafted XPM file which would cause an application to crash or potentially execute arbitrary code if opened by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-0687, CVE-2004-0688, and CVE-2004-0692 to these issues. A flaw was found in the X Display Manager (XDM). XDM is shipped with Red Hat Enterprise Linux, but is not used by default. XDM opened a chooserFd TCP socket even if the DisplayManager.requestPort parameter was set to 0. This allowed authorized users to access a machine remotely via X, even if the administrator had configured XDM to refuse such connections. Although XFree86 4.3.0 was not vulnerable to this issue, Red Hat Enterprise Linux 3 contained a backported patch which introduced this flaw. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0419 to this issue. Users are advised to upgrade to these erratum packages, which contain backported security patches to correct these and a number of other issues. last seen 2020-06-01 modified 2020-06-02 plugin id 15426 published 2004-10-06 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/15426 title RHEL 3 : XFree86 (RHSA-2004:478) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200407-05.NASL description The remote host is affected by the vulnerability described in GLSA-200407-05 (XFree86, X.org: XDM ignores requestPort setting) XDM will open TCP sockets for its chooser, even if the DisplayManager.requestPort setting is set to 0. Remote clients can use this port to connect to XDM and request a login window, thus allowing access to the system. Impact : Authorized users may be able to login remotely to a machine running XDM, even if this option is disabled in XDM last seen 2020-06-01 modified 2020-06-02 plugin id 14538 published 2004-08-30 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14538 title GLSA-200407-05 : XFree86, X.org: XDM ignores requestPort setting
Oval
accepted | 2013-04-29T04:02:27.597-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions. | ||||||||
family | unix | ||||||||
id | oval:org.mitre.oval:def:10161 | ||||||||
status | accepted | ||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||
title | XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions. | ||||||||
version | 26 |
Redhat
advisories |
| ||||
rpms |
|
References
- http://bugs.xfree86.org/show_bug.cgi?id=1376
- http://secunia.com/advisories/12019
- http://securitytracker.com/id?1010306
- http://www.ciac.org/ciac/bulletins/p-001.shtml
- http://www.gentoo.org/security/en/glsa/glsa-200407-05.xml
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:073
- http://www.openbsd.org/errata.html#xdm
- http://www.redhat.com/support/errata/RHSA-2004-478.html
- http://www.securityfocus.com/bid/10423
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124900
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16264
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10161