Vulnerabilities > CVE-2006-5214
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Race condition in the Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060225, and Solaris 8 through 10 before 20061006, causes a user's Xsession errors file to have weak permissions before a chmod is performed, which allows local users to read Xsession errors files of other users.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 | |
OS | 3 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS8_X86_111845.NASL description X11 6.4.1_x86: xdm patch. Date this patch was last updated by Sun : Jan/26/07 last seen 2020-06-01 modified 2020-06-02 plugin id 23447 published 2006-11-06 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/23447 title Solaris 8 (x86) : 111845-04 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(23447); script_version("1.19"); script_cvs_date("Date: 2019/10/25 13:36:24"); script_cve_id("CVE-2006-5214", "CVE-2006-5215"); script_name(english:"Solaris 8 (x86) : 111845-04"); script_summary(english:"Check for patch 111845-04"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 111845-04" ); script_set_attribute( attribute:"description", value: "X11 6.4.1_x86: xdm patch. Date this patch was last updated by Sun : Jan/26/07" ); script_set_attribute( attribute:"see_also", value:"http://download.oracle.com/sunalerts/1000298.1.html" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2007/01/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/11/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"111845-04", obsoleted_by:"", package:"SUNWxwopt", version:"6.4.1.3800,REV=0.1999.12.15") < 0) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:solaris_get_report()); else security_note(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Fedora Local Security Checks NASL id FEDORA_2007-659.NASL description - Thu Aug 2 2007 Soren Sandmann <sandmann at redhat.com> - 1.0.2-16 - Fix bug 212167; CVE-2006-5214. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 25864 published 2007-08-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25864 title Fedora Core 6 : xorg-x11-xinit-1.0.2-16.fc6 (2007-659) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2007-659. # include("compat.inc"); if (description) { script_id(25864); script_version ("1.13"); script_cvs_date("Date: 2019/08/02 13:32:26"); script_xref(name:"FEDORA", value:"2007-659"); script_name(english:"Fedora Core 6 : xorg-x11-xinit-1.0.2-16.fc6 (2007-659)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora Core host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Thu Aug 2 2007 Soren Sandmann <sandmann at redhat.com> - 1.0.2-16 - Fix bug 212167; CVE-2006-5214. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); # https://lists.fedoraproject.org/pipermail/package-announce/2007-August/003159.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?64dab9ef" ); script_set_attribute( attribute:"solution", value: "Update the affected xorg-x11-xinit and / or xorg-x11-xinit-debuginfo packages." ); script_set_attribute(attribute:"risk_factor", value:"High"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xorg-x11-xinit"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xorg-x11-xinit-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:6"); script_set_attribute(attribute:"patch_publication_date", value:"2007/08/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/08/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 6.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC6", reference:"xorg-x11-xinit-1.0.2-16.fc6")) flag++; if (rpm_check(release:"FC6", reference:"xorg-x11-xinit-debuginfo-1.0.2-16.fc6")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xorg-x11-xinit / xorg-x11-xinit-debuginfo"); }
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-364-1.NASL description A race condition existed that would allow other local users to see error messages generated during another user last seen 2020-06-01 modified 2020-06-02 plugin id 27944 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/27944 title Ubuntu 5.10 / 6.06 LTS : xinit vulnerability (USN-364-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-364-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(27944); script_version("1.14"); script_cvs_date("Date: 2019/08/02 13:33:01"); script_cve_id("CVE-2006-5214"); script_xref(name:"USN", value:"364-1"); script_name(english:"Ubuntu 5.10 / 6.06 LTS : xinit vulnerability (USN-364-1)"); script_summary(english:"Checks dpkg output for updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Ubuntu host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "A race condition existed that would allow other local users to see error messages generated during another user's X session. This could allow potentially sensitive information to be leaked. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/364-1/" ); script_set_attribute(attribute:"solution", value:"Update the affected xinit package."); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:P/I:N/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:xinit"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:5.10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:6.06:-:lts"); script_set_attribute(attribute:"patch_publication_date", value:"2006/10/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/11/10"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! ereg(pattern:"^(5\.10|6\.06)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 5.10 / 6.06", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"5.10", pkgname:"xinit", pkgver:"1.0+0.99.1-4ubuntu0.1")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"xinit", pkgver:"1.0.1-0ubuntu3.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_NOTE, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xinit"); }
NASL family Solaris Local Security Checks NASL id SOLARIS9_124830.NASL description X11 6.6.1: xdm patch. Date this patch was last updated by Sun : Jan/18/07 last seen 2020-06-01 modified 2020-06-02 plugin id 24407 published 2007-02-18 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24407 title Solaris 9 (sparc) : 124830-01 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(24407); script_version("1.17"); script_cvs_date("Date: 2019/10/25 13:36:24"); script_cve_id("CVE-2006-5214", "CVE-2006-5215"); script_name(english:"Solaris 9 (sparc) : 124830-01"); script_summary(english:"Check for patch 124830-01"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 124830-01" ); script_set_attribute( attribute:"description", value: "X11 6.6.1: xdm patch. Date this patch was last updated by Sun : Jan/18/07" ); script_set_attribute( attribute:"see_also", value:"http://download.oracle.com/sunalerts/1000298.1.html" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2007/01/18"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/02/18"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"124830-01", obsoleted_by:"", package:"SUNWxwopt", version:"6.6.1.5800,REV=0.2002.04.05") < 0) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:solaris_get_report()); else security_note(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS8_111844.NASL description X11 6.4.1 xdm patch. Date this patch was last updated by Sun : Jan/26/07 last seen 2020-06-01 modified 2020-06-02 plugin id 23335 published 2006-11-06 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/23335 title Solaris 8 (sparc) : 111844-04 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(23335); script_version("1.21"); script_cvs_date("Date: 2019/10/25 13:36:24"); script_cve_id("CVE-2006-5214", "CVE-2006-5215"); script_name(english:"Solaris 8 (sparc) : 111844-04"); script_summary(english:"Check for patch 111844-04"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 111844-04" ); script_set_attribute( attribute:"description", value: "X11 6.4.1 xdm patch. Date this patch was last updated by Sun : Jan/26/07" ); script_set_attribute( attribute:"see_also", value:"http://download.oracle.com/sunalerts/1000298.1.html" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2007/01/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/11/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"111844-04", obsoleted_by:"", package:"SUNWxwopt", version:"6.4.1.3800,REV=0.1999.12.15") < 0) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:solaris_get_report()); else security_note(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Fedora Local Security Checks NASL id FEDORA_2007-1409.NASL description - Thu Aug 2 2007 Soren Sandmann <sandmann at redhat.com> 1.0.2-21 - Fix bug 212167, CVE-2006-5214 - Sun Apr 22 2007 Matthias Clasen <mclasen at redhat.com> 1.0.2-20 - Don last seen 2020-06-01 modified 2020-06-02 plugin id 27714 published 2007-11-06 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27714 title Fedora 7 : xorg-x11-xinit-1.0.2-21.fc7 (2007-1409) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2007-1409. # include("compat.inc"); if (description) { script_id(27714); script_version ("1.12"); script_cvs_date("Date: 2019/08/02 13:32:25"); script_cve_id("CVE-2006-5214"); script_xref(name:"FEDORA", value:"2007-1409"); script_name(english:"Fedora 7 : xorg-x11-xinit-1.0.2-21.fc7 (2007-1409)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Thu Aug 2 2007 Soren Sandmann <sandmann at redhat.com> 1.0.2-21 - Fix bug 212167, CVE-2006-5214 - Sun Apr 22 2007 Matthias Clasen <mclasen at redhat.com> 1.0.2-20 - Don't install INSTALL Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); # https://lists.fedoraproject.org/pipermail/package-announce/2007-August/003077.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?d93c4dae" ); script_set_attribute( attribute:"solution", value: "Update the affected xorg-x11-xinit and / or xorg-x11-xinit-debuginfo packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:P/I:N/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xorg-x11-xinit"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xorg-x11-xinit-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:7"); script_set_attribute(attribute:"patch_publication_date", value:"2007/08/02"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/11/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 7.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC7", reference:"xorg-x11-xinit-1.0.2-21.fc7")) flag++; if (rpm_check(release:"FC7", reference:"xorg-x11-xinit-debuginfo-1.0.2-21.fc7")) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get()); else security_note(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xorg-x11-xinit / xorg-x11-xinit-debuginfo"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_124457.NASL description X11 6.6.2: xdm patch. Date this patch was last updated by Sun : Jul/16/10 This plugin has been deprecated and either replaced with individual 124457 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 23994 published 2007-01-08 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=23994 title Solaris 10 (sparc) : 124457-03 (deprecated) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_124458.NASL description X11 6.6.2_x86: xdm patch. Date this patch was last updated by Sun : Jul/16/10 This plugin has been deprecated and either replaced with individual 124458 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 23918 published 2006-12-18 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=23918 title Solaris 10 (x86) : 124458-03 (deprecated) NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_124831.NASL description X11 6.6.1_x86: xdm patch. Date this patch was last updated by Sun : Jan/18/07 last seen 2020-06-01 modified 2020-06-02 plugin id 24410 published 2007-02-18 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24410 title Solaris 9 (x86) : 124831-01
Oval
accepted | 2007-09-27T08:57:41.428-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Race condition in the Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060225, and Solaris 8 through 10 before 20061006, causes a user's Xsession errors file to have weak permissions before a chmod is performed, which allows local users to read Xsession errors files of other users. | ||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:1760 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2007-08-10T12:25:23.000-04:00 | ||||||||||||||||||||||||
title | Security Vulnerability in X Display Manager (xdm(1)) Xsession Script | ||||||||||||||||||||||||
version | 35 |
Statements
contributor | Mark J Cox |
lastmodified | 2007-03-14 |
organization | Red Hat |
statement | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
References
- http://www.netbsd.org/cgi-bin/query-pr-single.pl?number=32804
- https://bugs.freedesktop.org/show_bug.cgi?id=5897
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102652-1
- http://www.securityfocus.com/bid/20400
- http://securitytracker.com/id?1017015
- http://secunia.com/advisories/22323
- http://secunia.com/advisories/22439
- http://www.ubuntu.com/usn/usn-364-1
- http://secunia.com/advisories/22469
- http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm
- http://secunia.com/advisories/22992
- http://www.vupen.com/english/advisories/2006/3962
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1760