7.2
CVSSv2

CVE-2006-0745

Published: 21/03/2006 Updated: 19/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x.org x11r7 1.0

x.org x11r7 1.0.1

x.org x11r6 6.9

mandrakesoft mandrake linux 2006

redhat fedora core core_5.0

sun solaris 10.0

suse suse linux 10.0

Vendor Advisories

Debian Bug report logs - #360388 xserver-xorg: local user DoS and arbitrary code execution as root [CVE-2006-0745] Package: xserver-xorg; Maintainer for xserver-xorg is Debian X Strike Force <debian-x@listsdebianorg>; Source for xserver-xorg is src:xorg (PTS, buildd, popcon) Reported by: Filipus Klutiero <cheal@hotpopc ...

Exploits

# From Daniel Stone's Advisory # xorg-server 100, as shipped with X11R70, and all release candidates # of X11R70, is vulnerable # X11R690, and all release candidates, are vulnerable # X11R682 and earlier versions are not vulnerable # The rest is H D Moore from metasploit Two second exploit, but if anyone is lazy: $ wget metasp ...
xorg-x11-server versions prior to 1203 modulepath local privilege escalation exploit ...