CVE-2006-4447
Summary
| CVE | CVE-2006-4447 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-08-30 01:04:00 UTC |
| Updated | 2011-03-08 02:40:00 UTC |
| Description | X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | X.org | Emu-linux-x87-xlibs | 7.0_r1 | All | All | All |
| Application | X.org | Emu-linux-x87-xlibs | 7.0_r1 | All | All | All |
| Application | X.org | X11r6 | 6.7.0 | All | All | All |
| Application | X.org | X11r6 | 6.8 | All | All | All |
| Application | X.org | X11r6 | 6.8.1 | All | All | All |
| Application | X.org | X11r6 | 6.8.2 | All | All | All |
| Application | X.org | X11r6 | 6.7.0 | All | All | All |
| Application | X.org | X11r6 | 6.8 | All | All | All |
| Application | X.org | X11r6 | 6.8.1 | All | All | All |
| Application | X.org | X11r6 | 6.8.2 | All | All | All |
| Application | X.org | X11r7 | 1.0 | All | All | All |
| Application | X.org | X11r7 | 1.0.1 | All | All | All |
| Application | X.org | X11r7 | 1.0.2 | All | All | All |
| Application | X.org | X11r7 | 1.0 | All | All | All |
| Application | X.org | X11r7 | 1.0.1 | All | All | All |
| Application | X.org | X11r7 | 1.0.2 | All | All | All |
| Application | X.org | Xdm | 1.0.3 | All | All | All |
| Application | X.org | Xdm | 1.0.3 | All | All | All |
| Application | X.org | Xf86dga | 1.0.0 | All | All | All |
| Application | X.org | Xf86dga | 1.0.0 | All | All | All |
| Application | X.org | Xinit | 1.0.2_r5 | All | All | All |
| Application | X.org | Xinit | 1.0.2_r5 | All | All | All |
| Application | X.org | Xload | 1.0.0 | All | All | All |
| Application | X.org | Xload | 1.0.0 | All | All | All |
| Application | X.org | Xorg-server | 1.02_r5 | All | All | All |
| Application | X.org | Xorg-server | 1.02_r5 | All | All | All |
| Application | X.org | Xterm | 214 | All | All | All |
| Application | X.org | Xterm | 214 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Gentoo update for beast - Advisories - Secunia | SECUNIA | secunia.com | |
| Security Advisory SA21693 - Mandriva update for xorg-x11 - Secunia | SECUNIA | secunia.com | |
| X.Org X11 setuid Security Issues - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| Beast Resource Limit Local Denial Of Service Vulnerability | BID | www.securityfocus.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Gentoo Linux Documentation -- X.org and some X.org libraries: Local privilege escalations | GENTOO | security.gentoo.org | Patch, Vendor Advisory |
| Multiple X.Org Products SetUID Local Privilege Escalation Vulnerability | BID | www.securityfocus.com | |
| X.Org security advisory: setuid return value check problems | MLIST | lists.freedesktop.org | Patch |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Debian update for xfree86 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Debian -- Security Information -- DSA-1193-1 xfree86 | DEBIAN | www.debian.org | |
| BEAST/BSE "seteuid()" and "setreuid()" Security Issue - Advisories - Secunia | SECUNIA | secunia.com | |
| ANNOUNCE: BEAST/BSE v0.7.1 | MLIST | mail.gnome.org | |
| Gentoo Update for Multiple Packages - Advisories - Community | SECUNIA | secunia.com | |
| US-CERT Vulnerability Note VU#300368 | CERT-VN | www.kb.cert.org | US Government Resource |
| Advisories - Mandriva Linux | MANDRIVA | www.mandriva.com | |
| BEAST: Denial of Service — Gentoo Linux Documentation | GENTOO | security.gentoo.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2006-09-12 | Mark J Cox | Not Vulnerable. This issue does not exist in Red Hat Enterprise Linux 2.1 or 3. This issue not exploitable in Red Hat Enterprise Linux 4. A detailed analysis of this issue can be found in the Red Hat Bug Tracking System: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195555 |
There are currently no legacy QID mappings associated with this CVE.