7.2
CVSSv2

CVE-2006-0745

Published: 21/03/2006 Updated: 19/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x.org x11r7 1.0

x.org x11r7 1.0.1

x.org x11r6 6.9

mandrakesoft mandrake linux 2006

suse suse linux 10.0

redhat fedora core core 5.0

sun solaris 10.0

Vendor Advisories

Debian Bug report logs - #360388 xserver-xorg: local user DoS and arbitrary code execution as root [CVE-2006-0745] Package: xserver-xorg; Maintainer for xserver-xorg is Debian X Strike Force <debian-x@listsdebianorg>; Source for xserver-xorg is src:xorg (PTS, buildd, popcon) Reported by: Filipus Klutiero <cheal@hotpopc ...

Exploits

# From Daniel Stone's Advisory # xorg-server 100, as shipped with X11R70, and all release candidates # of X11R70, is vulnerable # X11R690, and all release candidates, are vulnerable # X11R682 and earlier versions are not vulnerable # The rest is H D Moore from metasploit Two second exploit, but if anyone is lazy: $ wget metasp ...
xorg-x11-server versions prior to 1203 modulepath local privilege escalation exploit ...