exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28584

Secunia Security Advisory 28584
Posted Jan 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for x11-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, mandriva
SHA-256 | d4492bb3a8c57468dfb513f8a3fd6f291fb4662efcd3309ffd6418ae3bdef7ba

Secunia Security Advisory 28584

Change Mirror Download


----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Mandriva update for x11-server

SECUNIA ADVISORY ID:
SA28584

VERIFY ADVISORY:
http://secunia.com/advisories/28584/

CRITICAL:
Less critical

IMPACT:
Exposure of sensitive information, Privilege escalation, DoS

WHERE:
Local system

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for x11-server. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, or to gain escalated privileges.

For more information:
SA28532

SOLUTION:
Apply updated packages.

Mandriva Linux 2007

536b2b843db365fa759ebcce5aadf8fa
2007.0/i586/x11-server-1.1.1-12.3mdv2007.0.i586.rpm
4e5e7b280242217f8168f9b47ff8781a
2007.0/i586/x11-server-common-1.1.1-12.3mdv2007.0.i586.rpm
cb1487dd1eceb45aa03b9a0aa77a293c
2007.0/i586/x11-server-devel-1.1.1-12.3mdv2007.0.i586.rpm
2c319a8ae154d1645656dd4a7f1fe239
2007.0/i586/x11-server-xati-1.1.1-12.3mdv2007.0.i586.rpm
079f895ff1d5e2f48aaa556bd7a59519
2007.0/i586/x11-server-xchips-1.1.1-12.3mdv2007.0.i586.rpm
54e005629b2f4b56f2b01dc5a6769b45
2007.0/i586/x11-server-xdmx-1.1.1-12.3mdv2007.0.i586.rpm
582b3f8eaabc14a13c652c9541db5a3a
2007.0/i586/x11-server-xephyr-1.1.1-12.3mdv2007.0.i586.rpm
382083d039b8fb981fdef2d3f2952e5d
2007.0/i586/x11-server-xepson-1.1.1-12.3mdv2007.0.i586.rpm
2cd603401aa8507c79a45a377a5dc5a5
2007.0/i586/x11-server-xfake-1.1.1-12.3mdv2007.0.i586.rpm
4dd7e8fb8b15ac5ae913a770e3dc0edd
2007.0/i586/x11-server-xfbdev-1.1.1-12.3mdv2007.0.i586.rpm
f233d76be20f906e0447a13142e92bda
2007.0/i586/x11-server-xi810-1.1.1-12.3mdv2007.0.i586.rpm
6d54b4cdb68a27648ea045ecaa7e2e93
2007.0/i586/x11-server-xmach64-1.1.1-12.3mdv2007.0.i586.rpm
a205af74dace2a90e0bf7ab595cae4a5
2007.0/i586/x11-server-xmga-1.1.1-12.3mdv2007.0.i586.rpm
99ed4f80e419c9eced26083d27b04dcb
2007.0/i586/x11-server-xneomagic-1.1.1-12.3mdv2007.0.i586.rpm
8cc833f4c1ea7853f4269182ee8c8662
2007.0/i586/x11-server-xnest-1.1.1-12.3mdv2007.0.i586.rpm
0cec70b4e20ffc9ef6da1b277b00a4dc
2007.0/i586/x11-server-xnvidia-1.1.1-12.3mdv2007.0.i586.rpm
a0a7a471c0223fe3a961f602b36b5c3c
2007.0/i586/x11-server-xorg-1.1.1-12.3mdv2007.0.i586.rpm
5d1784f3afcb6f056da1524191d79e7d
2007.0/i586/x11-server-xpm2-1.1.1-12.3mdv2007.0.i586.rpm
ef2a81299e26c3da215f6d1150da75ef
2007.0/i586/x11-server-xprt-1.1.1-12.3mdv2007.0.i586.rpm
8ffbdfbd4fd6d98d88956fbbd1b4547d
2007.0/i586/x11-server-xr128-1.1.1-12.3mdv2007.0.i586.rpm
b847cccad2ee87d6a81e73a450d4be1e
2007.0/i586/x11-server-xsdl-1.1.1-12.3mdv2007.0.i586.rpm
820cb3af32609084de5af13dae86658a
2007.0/i586/x11-server-xsmi-1.1.1-12.3mdv2007.0.i586.rpm
7386f22db489688076d2a683a2275b16
2007.0/i586/x11-server-xvesa-1.1.1-12.3mdv2007.0.i586.rpm
1be8682ca9f2b5ea024e851015779a6f
2007.0/i586/x11-server-xvfb-1.1.1-12.3mdv2007.0.i586.rpm
4078f13ac77324a07439f964d86c5878
2007.0/i586/x11-server-xvia-1.1.1-12.3mdv2007.0.i586.rpm
0cb8cf686f9af1d660e2bdb52e291c59
2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

bf838b3ef7c3e8e8684c51511a705de3
2007.0/x86_64/x11-server-1.1.1-12.3mdv2007.0.x86_64.rpm
969a80b0fd6e55fec6548392bcebb9c6
2007.0/x86_64/x11-server-common-1.1.1-12.3mdv2007.0.x86_64.rpm
c629fdc6b3437d105296245b5f2b714d
2007.0/x86_64/x11-server-devel-1.1.1-12.3mdv2007.0.x86_64.rpm
4656a0128755192b4dd385a61d47c79f
2007.0/x86_64/x11-server-xdmx-1.1.1-12.3mdv2007.0.x86_64.rpm
95074952395ca22438f36095fd1b8b89
2007.0/x86_64/x11-server-xephyr-1.1.1-12.3mdv2007.0.x86_64.rpm
beeff525e9266eb9868c8d8678c73c15
2007.0/x86_64/x11-server-xfake-1.1.1-12.3mdv2007.0.x86_64.rpm
1de55a43f5ddbee1915da4f4168081e6
2007.0/x86_64/x11-server-xfbdev-1.1.1-12.3mdv2007.0.x86_64.rpm
e641780613f609debbb6bf8a3ccffb70
2007.0/x86_64/x11-server-xnest-1.1.1-12.3mdv2007.0.x86_64.rpm
b5e65fb9bd6e8269be240b81a341bd05
2007.0/x86_64/x11-server-xorg-1.1.1-12.3mdv2007.0.x86_64.rpm
83a7254129bd392490b51ce15262a3cc
2007.0/x86_64/x11-server-xprt-1.1.1-12.3mdv2007.0.x86_64.rpm
8195afdcaf12dafe279a3d2c59494e97
2007.0/x86_64/x11-server-xsdl-1.1.1-12.3mdv2007.0.x86_64.rpm
4cfe6e309d62fc1b11b335f8b14b4eb0
2007.0/x86_64/x11-server-xvfb-1.1.1-12.3mdv2007.0.x86_64.rpm
0cb8cf686f9af1d660e2bdb52e291c59
2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:023

OTHER REFERENCES:
SA28532:
http://secunia.com/advisories/28532/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close