Vulnerabilities > CVE-2007-2437 - Denial of Service vulnerability in X.Org X Window System Xserver XRender Extension Divide by Zero
Attack vector
ADJACENT_NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
NONE Integrity impact
NONE Availability impact
COMPLETE Summary
The X render (Xrender) extension in X.org X Window System 7.0, 7.1, and 7.2, with Xserver 1.3.0 and earlier, allows remote authenticated users to cause a denial of service (daemon crash) via crafted values to the (1) XRenderCompositeTrapezoids and (2) XRenderAddTraps functions, which trigger a divide-by-zero error.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Exploit-Db
description | X.Org X Window System Xserver 1.3 XRender Extension Divide by Zero Denial of Service Vulnerability. CVE-2007-2437. Dos exploit for linux platform |
id | EDB-ID:29939 |
last seen | 2016-02-03 |
modified | 2007-05-01 |
published | 2007-05-01 |
reporter | Derek Abdine |
source | https://www.exploit-db.com/download/29939/ |
title | X.Org X Window System Xserver 1.3 XRender Extension Divide by Zero Denial of Service Vulnerability |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125720-65.NASL description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Oct/13/14 last seen 2020-06-01 modified 2020-06-02 plugin id 107936 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107936 title Solaris 10 (x86) : 125720-65 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(107936); script_version("1.5"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2007-2437"); script_name(english:"Solaris 10 (x86) : 125720-65"); script_summary(english:"Check for patch 125720-65"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 125720-65" ); script_set_attribute( attribute:"description", value: "X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Oct/13/14" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/125720-65" ); script_set_attribute(attribute:"solution", value:"Install patch 125720-65 or higher"); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-2437"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:118966"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:119062"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:121044"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:125720"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/05/02"); script_set_attribute(attribute:"patch_publication_date", value:"2014/10/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("solaris.inc"); showrev = get_kb_item("Host/Solaris/showrev"); if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris"); os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev); if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris"); full_ver = os_ver[1]; os_level = os_ver[2]; if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level); package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev); if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH); package_arch = package_arch[1]; if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-cfg", version:"6.8.2.5.10.0110,REV=0.2005.06.29") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-client-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-client-programs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-devel-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-doc", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-graphics-ddx", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-mesa", version:"6.8.2.5.10.0113,REV=0.2005.08.02") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-server", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxorg-xkb", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-65", obsoleted_by:"", package:"SUNWxvnc", version:"6.6.2.0500,REV=0.2008.02.15") < 0) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : solaris_get_report() ); } else { patch_fix = solaris_patch_fix_get(); if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10"); tested = solaris_pkg_tests_get(); if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWxorg-cfg / SUNWxorg-client-docs / SUNWxorg-client-programs / etc"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125720-59.NASL description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Sep/12/13 last seen 2020-06-01 modified 2020-06-02 plugin id 107935 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107935 title Solaris 10 (x86) : 125720-59 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(107935); script_version("1.5"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2007-2437"); script_name(english:"Solaris 10 (x86) : 125720-59"); script_summary(english:"Check for patch 125720-59"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 125720-59" ); script_set_attribute( attribute:"description", value: "X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Sep/12/13" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/125720-59" ); script_set_attribute(attribute:"solution", value:"Install patch 125720-59 or higher"); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-2437"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:118966"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:119062"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:121044"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:125720"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/05/02"); script_set_attribute(attribute:"patch_publication_date", value:"2013/09/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("solaris.inc"); showrev = get_kb_item("Host/Solaris/showrev"); if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris"); os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev); if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris"); full_ver = os_ver[1]; os_level = os_ver[2]; if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level); package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev); if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH); package_arch = package_arch[1]; if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-cfg", version:"6.8.2.5.10.0110,REV=0.2005.06.29") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-client-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-client-programs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-devel-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-doc", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-graphics-ddx", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-mesa", version:"6.8.2.5.10.0113,REV=0.2005.08.02") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-server", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxorg-xkb", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-59", obsoleted_by:"", package:"SUNWxvnc", version:"6.6.2.0500,REV=0.2008.02.15") < 0) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : solaris_get_report() ); } else { patch_fix = solaris_patch_fix_get(); if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10"); tested = solaris_pkg_tests_get(); if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWxorg-cfg / SUNWxorg-client-docs / SUNWxorg-client-programs / etc"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125720-71.NASL description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Nov/04/19 last seen 2020-06-01 modified 2020-06-02 plugin id 130511 published 2019-11-05 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130511 title Solaris 10 (x86) : 125720-71 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(130511); script_version("1.3"); script_cvs_date("Date: 2020/01/07"); script_cve_id("CVE-2007-2437"); script_name(english:"Solaris 10 (x86) : 125720-71"); script_summary(english:"Check for patch 125720-71"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 125720-71" ); script_set_attribute( attribute:"description", value: "X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Nov/04/19" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/125720-71" ); script_set_attribute(attribute:"solution", value:"Install patch 125720-71 or higher"); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-2437"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:118966"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:119062"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:121044"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:125720"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/05/02"); script_set_attribute(attribute:"patch_publication_date", value:"2019/11/04"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/05"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("solaris.inc"); showrev = get_kb_item("Host/Solaris/showrev"); if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris"); os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev); if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris"); full_ver = os_ver[1]; os_level = os_ver[2]; if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level); package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev); if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH); package_arch = package_arch[1]; if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-cfg", version:"6.8.2.5.10.0110,REV=0.2005.06.29") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-client-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-client-programs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-devel-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-doc", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-graphics-ddx", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-mesa", version:"6.8.2.5.10.0113,REV=0.2005.08.02") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-server", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxorg-xkb", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-71", obsoleted_by:"", package:"SUNWxvnc", version:"6.6.2.0500,REV=0.2008.02.15") < 0) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : solaris_get_report() ); } else { patch_fix = solaris_patch_fix_get(); if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10"); tested = solaris_pkg_tests_get(); if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWxorg-cfg / SUNWxorg-client-docs / SUNWxorg-client-programs / etc"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125720-66.NASL description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Jul/13/15 last seen 2020-06-01 modified 2020-06-02 plugin id 107937 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107937 title Solaris 10 (x86) : 125720-66 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(107937); script_version("1.5"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2007-2437"); script_name(english:"Solaris 10 (x86) : 125720-66"); script_summary(english:"Check for patch 125720-66"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 125720-66" ); script_set_attribute( attribute:"description", value: "X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Jul/13/15" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/125720-66" ); script_set_attribute(attribute:"solution", value:"Install patch 125720-66 or higher"); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-2437"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:118966"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:119062"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:121044"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:125720"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/05/02"); script_set_attribute(attribute:"patch_publication_date", value:"2015/07/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("solaris.inc"); showrev = get_kb_item("Host/Solaris/showrev"); if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris"); os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev); if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris"); full_ver = os_ver[1]; os_level = os_ver[2]; if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level); package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev); if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH); package_arch = package_arch[1]; if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-cfg", version:"6.8.2.5.10.0110,REV=0.2005.06.29") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-client-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-client-programs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-devel-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-doc", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-graphics-ddx", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-mesa", version:"6.8.2.5.10.0113,REV=0.2005.08.02") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-server", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxorg-xkb", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-66", obsoleted_by:"", package:"SUNWxvnc", version:"6.6.2.0500,REV=0.2008.02.15") < 0) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : solaris_get_report() ); } else { patch_fix = solaris_patch_fix_get(); if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10"); tested = solaris_pkg_tests_get(); if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWxorg-cfg / SUNWxorg-client-docs / SUNWxorg-client-programs / etc"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125720-67.NASL description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Nov/12/15 last seen 2020-06-01 modified 2020-06-02 plugin id 107938 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107938 title Solaris 10 (x86) : 125720-67 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(107938); script_version("1.5"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2007-2437"); script_name(english:"Solaris 10 (x86) : 125720-67"); script_summary(english:"Check for patch 125720-67"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 125720-67" ); script_set_attribute( attribute:"description", value: "X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Nov/12/15" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/125720-67" ); script_set_attribute(attribute:"solution", value:"Install patch 125720-67 or higher"); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-2437"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:118966"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:119062"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:121044"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:125720"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/05/02"); script_set_attribute(attribute:"patch_publication_date", value:"2015/11/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("solaris.inc"); showrev = get_kb_item("Host/Solaris/showrev"); if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris"); os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev); if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris"); full_ver = os_ver[1]; os_level = os_ver[2]; if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level); package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev); if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH); package_arch = package_arch[1]; if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-cfg", version:"6.8.2.5.10.0110,REV=0.2005.06.29") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-client-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-client-programs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-devel-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-doc", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-graphics-ddx", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-mesa", version:"6.8.2.5.10.0113,REV=0.2005.08.02") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-server", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxorg-xkb", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-67", obsoleted_by:"", package:"SUNWxvnc", version:"6.6.2.0500,REV=0.2008.02.15") < 0) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : solaris_get_report() ); } else { patch_fix = solaris_patch_fix_get(); if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10"); tested = solaris_pkg_tests_get(); if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWxorg-cfg / SUNWxorg-client-docs / SUNWxorg-client-programs / etc"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125720-68.NASL description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Mar/09/17 last seen 2020-06-01 modified 2020-06-02 plugin id 107939 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107939 title Solaris 10 (x86) : 125720-68 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(107939); script_version("1.5"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2007-2437"); script_name(english:"Solaris 10 (x86) : 125720-68"); script_summary(english:"Check for patch 125720-68"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 125720-68" ); script_set_attribute( attribute:"description", value: "X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Mar/09/17" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/125720-68" ); script_set_attribute(attribute:"solution", value:"Install patch 125720-68 or higher"); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-2437"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:118966"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:119062"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:121044"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:125720"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/05/02"); script_set_attribute(attribute:"patch_publication_date", value:"2017/03/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("solaris.inc"); showrev = get_kb_item("Host/Solaris/showrev"); if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris"); os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev); if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris"); full_ver = os_ver[1]; os_level = os_ver[2]; if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level); package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev); if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH); package_arch = package_arch[1]; if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-cfg", version:"6.8.2.5.10.0110,REV=0.2005.06.29") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-client-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-client-programs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-devel-docs", version:"6.8.2.5.10.0110,REV=0.2005.06.21") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-doc", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-graphics-ddx", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-mesa", version:"6.8.2.5.10.0113,REV=0.2005.08.02") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-server", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxorg-xkb", version:"6.8.0.5.10.7400,REV=0.2004.12.15") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"125720-68", obsoleted_by:"", package:"SUNWxvnc", version:"6.6.2.0500,REV=0.2008.02.15") < 0) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : solaris_get_report() ); } else { patch_fix = solaris_patch_fix_get(); if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10"); tested = solaris_pkg_tests_get(); if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWxorg-cfg / SUNWxorg-client-docs / SUNWxorg-client-programs / etc"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_125720.NASL description X11 6.8.0_x86: Xorg server patch. Date this patch was last updated by Sun : Aug/23/17 This plugin has been deprecated and either replaced with individual 125720 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 25395 published 2007-06-04 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=25395 title Solaris 10 (x86) : 125720-70 (deprecated) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201301-01.NASL description The remote host is affected by the vulnerability described in GLSA-201301-01 (Mozilla Products: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL’s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser’s font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 63402 published 2013-01-08 reporter This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/63402 title GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)
Statements
contributor | Joshua Bressers |
lastmodified | 2007-05-25 |
organization | Red Hat |
statement | Red Hat does not consider a user assisted client crash such as this to be a security flaw. |
References
- http://osvdb.org/34905
- http://secunia.com/advisories/25121
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102901-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200067-1
- http://www.rapid7.com/advisories/R7-0027.jsp
- http://www.securityfocus.com/bid/23741
- http://www.securitytracker.com/id?1017984
- http://www.vupen.com/english/advisories/2007/1601
- http://www.vupen.com/english/advisories/2007/1658
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33976