Vulnerabilities > CVE-2011-2504 - Unspecified vulnerability in Xfree86 X11Perf

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
xfree86
nessus

Summary

Untrusted search path vulnerability in x11perfcomp in XFree86 x11perf before 1.5.4 allows local users to gain privileges via unspecified Trojan horse code in the current working directory.

Vulnerable Configurations

Part Description Count
Application
Xfree86
4

Nessus

  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0502.NASL
    descriptionFrom Red Hat Security Advisory 2013:0502 : Updated core client packages for the X Window System that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Core X11 clients packages provide the xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps clients that ship with the X Window System. It was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker-controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. (BZ#835277, BZ#835278, BZ#835281) All users of xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen2020-06-01
    modified2020-06-02
    plugin id68742
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68742
    titleOracle Linux 6 : Core X11 clients (ELSA-2013-0502)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0502.NASL
    descriptionUpdated core client packages for the X Window System that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Core X11 clients packages provide the xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps clients that ship with the X Window System. It was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker-controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. (BZ#835277, BZ#835278, BZ#835281) All users of xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen2020-06-01
    modified2020-06-02
    plugin id65137
    published2013-03-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/65137
    titleCentOS 6 : xorg-x11-apps / xorg-x11-server-utils / xorg-x11-utils (CESA-2013:0502)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0502.NASL
    descriptionUpdated core client packages for the X Window System that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Core X11 clients packages provide the xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps clients that ship with the X Window System. It was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker-controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. (BZ#835277, BZ#835278, BZ#835281) All users of xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen2020-06-01
    modified2020-06-02
    plugin id64753
    published2013-02-21
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/64753
    titleRHEL 6 : Core X11 clients (RHSA-2013:0502)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130221_CORE_X11_CLIENTS_ON_SL6_X.NASL
    descriptionIt was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker- controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. *xorg ABI change With this update there is a change in the X.org ABI for the video drivers. This change will require compatible drivers. Anyone using the drivers shipped with SL should have no problems. Anyone using drivers from an external source - such as nVidia, ATI, or ELRepo should ensure a compatible driver is loaded. Please ensure you are on the most recent compatible driver before updating the system. --
    last seen2020-03-18
    modified2013-03-15
    plugin id65563
    published2013-03-15
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/65563
    titleScientific Linux Security Update : Core X11 clients on SL6.x i386/x86_64 (20130221)

Redhat

advisories
bugzilla
id717672
titleCVE-2011-2504 x11perfcomp has dot in its path
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 6 is installed
      ovaloval:com.redhat.rhba:tst:20111656003
    • OR
      • AND
        • commentxorg-x11-utils is earlier than 0:7.5-6.el6
          ovaloval:com.redhat.rhsa:tst:20130502001
        • commentxorg-x11-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20130502002
      • AND
        • commentxorg-x11-server-utils is earlier than 0:7.5-13.el6
          ovaloval:com.redhat.rhsa:tst:20130502003
        • commentxorg-x11-server-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376154
      • AND
        • commentxorg-x11-apps is earlier than 0:7.6-6.el6
          ovaloval:com.redhat.rhsa:tst:20130502005
        • commentxorg-x11-apps is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376152
rhsa
idRHSA-2013:0502
released2013-02-20
severityLow
titleRHSA-2013:0502: Core X11 clients security, bug fix, and enhancement update (Low)
rpms
  • xorg-x11-apps-0:7.6-6.el6
  • xorg-x11-apps-debuginfo-0:7.6-6.el6
  • xorg-x11-server-utils-0:7.5-13.el6
  • xorg-x11-server-utils-debuginfo-0:7.5-13.el6
  • xorg-x11-utils-0:7.5-6.el6
  • xorg-x11-utils-debuginfo-0:7.5-6.el6