exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28584

Secunia Security Advisory 28584
Posted Jan 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for x11-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, mandriva
SHA-256 | d4492bb3a8c57468dfb513f8a3fd6f291fb4662efcd3309ffd6418ae3bdef7ba

Secunia Security Advisory 28584

Change Mirror Download


----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Mandriva update for x11-server

SECUNIA ADVISORY ID:
SA28584

VERIFY ADVISORY:
http://secunia.com/advisories/28584/

CRITICAL:
Less critical

IMPACT:
Exposure of sensitive information, Privilege escalation, DoS

WHERE:
Local system

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for x11-server. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, or to gain escalated privileges.

For more information:
SA28532

SOLUTION:
Apply updated packages.

Mandriva Linux 2007

536b2b843db365fa759ebcce5aadf8fa
2007.0/i586/x11-server-1.1.1-12.3mdv2007.0.i586.rpm
4e5e7b280242217f8168f9b47ff8781a
2007.0/i586/x11-server-common-1.1.1-12.3mdv2007.0.i586.rpm
cb1487dd1eceb45aa03b9a0aa77a293c
2007.0/i586/x11-server-devel-1.1.1-12.3mdv2007.0.i586.rpm
2c319a8ae154d1645656dd4a7f1fe239
2007.0/i586/x11-server-xati-1.1.1-12.3mdv2007.0.i586.rpm
079f895ff1d5e2f48aaa556bd7a59519
2007.0/i586/x11-server-xchips-1.1.1-12.3mdv2007.0.i586.rpm
54e005629b2f4b56f2b01dc5a6769b45
2007.0/i586/x11-server-xdmx-1.1.1-12.3mdv2007.0.i586.rpm
582b3f8eaabc14a13c652c9541db5a3a
2007.0/i586/x11-server-xephyr-1.1.1-12.3mdv2007.0.i586.rpm
382083d039b8fb981fdef2d3f2952e5d
2007.0/i586/x11-server-xepson-1.1.1-12.3mdv2007.0.i586.rpm
2cd603401aa8507c79a45a377a5dc5a5
2007.0/i586/x11-server-xfake-1.1.1-12.3mdv2007.0.i586.rpm
4dd7e8fb8b15ac5ae913a770e3dc0edd
2007.0/i586/x11-server-xfbdev-1.1.1-12.3mdv2007.0.i586.rpm
f233d76be20f906e0447a13142e92bda
2007.0/i586/x11-server-xi810-1.1.1-12.3mdv2007.0.i586.rpm
6d54b4cdb68a27648ea045ecaa7e2e93
2007.0/i586/x11-server-xmach64-1.1.1-12.3mdv2007.0.i586.rpm
a205af74dace2a90e0bf7ab595cae4a5
2007.0/i586/x11-server-xmga-1.1.1-12.3mdv2007.0.i586.rpm
99ed4f80e419c9eced26083d27b04dcb
2007.0/i586/x11-server-xneomagic-1.1.1-12.3mdv2007.0.i586.rpm
8cc833f4c1ea7853f4269182ee8c8662
2007.0/i586/x11-server-xnest-1.1.1-12.3mdv2007.0.i586.rpm
0cec70b4e20ffc9ef6da1b277b00a4dc
2007.0/i586/x11-server-xnvidia-1.1.1-12.3mdv2007.0.i586.rpm
a0a7a471c0223fe3a961f602b36b5c3c
2007.0/i586/x11-server-xorg-1.1.1-12.3mdv2007.0.i586.rpm
5d1784f3afcb6f056da1524191d79e7d
2007.0/i586/x11-server-xpm2-1.1.1-12.3mdv2007.0.i586.rpm
ef2a81299e26c3da215f6d1150da75ef
2007.0/i586/x11-server-xprt-1.1.1-12.3mdv2007.0.i586.rpm
8ffbdfbd4fd6d98d88956fbbd1b4547d
2007.0/i586/x11-server-xr128-1.1.1-12.3mdv2007.0.i586.rpm
b847cccad2ee87d6a81e73a450d4be1e
2007.0/i586/x11-server-xsdl-1.1.1-12.3mdv2007.0.i586.rpm
820cb3af32609084de5af13dae86658a
2007.0/i586/x11-server-xsmi-1.1.1-12.3mdv2007.0.i586.rpm
7386f22db489688076d2a683a2275b16
2007.0/i586/x11-server-xvesa-1.1.1-12.3mdv2007.0.i586.rpm
1be8682ca9f2b5ea024e851015779a6f
2007.0/i586/x11-server-xvfb-1.1.1-12.3mdv2007.0.i586.rpm
4078f13ac77324a07439f964d86c5878
2007.0/i586/x11-server-xvia-1.1.1-12.3mdv2007.0.i586.rpm
0cb8cf686f9af1d660e2bdb52e291c59
2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

bf838b3ef7c3e8e8684c51511a705de3
2007.0/x86_64/x11-server-1.1.1-12.3mdv2007.0.x86_64.rpm
969a80b0fd6e55fec6548392bcebb9c6
2007.0/x86_64/x11-server-common-1.1.1-12.3mdv2007.0.x86_64.rpm
c629fdc6b3437d105296245b5f2b714d
2007.0/x86_64/x11-server-devel-1.1.1-12.3mdv2007.0.x86_64.rpm
4656a0128755192b4dd385a61d47c79f
2007.0/x86_64/x11-server-xdmx-1.1.1-12.3mdv2007.0.x86_64.rpm
95074952395ca22438f36095fd1b8b89
2007.0/x86_64/x11-server-xephyr-1.1.1-12.3mdv2007.0.x86_64.rpm
beeff525e9266eb9868c8d8678c73c15
2007.0/x86_64/x11-server-xfake-1.1.1-12.3mdv2007.0.x86_64.rpm
1de55a43f5ddbee1915da4f4168081e6
2007.0/x86_64/x11-server-xfbdev-1.1.1-12.3mdv2007.0.x86_64.rpm
e641780613f609debbb6bf8a3ccffb70
2007.0/x86_64/x11-server-xnest-1.1.1-12.3mdv2007.0.x86_64.rpm
b5e65fb9bd6e8269be240b81a341bd05
2007.0/x86_64/x11-server-xorg-1.1.1-12.3mdv2007.0.x86_64.rpm
83a7254129bd392490b51ce15262a3cc
2007.0/x86_64/x11-server-xprt-1.1.1-12.3mdv2007.0.x86_64.rpm
8195afdcaf12dafe279a3d2c59494e97
2007.0/x86_64/x11-server-xsdl-1.1.1-12.3mdv2007.0.x86_64.rpm
4cfe6e309d62fc1b11b335f8b14b4eb0
2007.0/x86_64/x11-server-xvfb-1.1.1-12.3mdv2007.0.x86_64.rpm
0cb8cf686f9af1d660e2bdb52e291c59
2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:023

OTHER REFERENCES:
SA28532:
http://secunia.com/advisories/28532/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close