CVE-2006-4447
Published Aug 30, 2006
Last updated 14 years ago
Overview
- Description
- X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatNot Vulnerable. This issue does not exist in Red Hat Enterprise Linux 2.1 or 3. This issue not exploitable in Red Hat Enterprise Linux 4. A detailed analysis of this issue can be found in the Red Hat Bug Tracking System: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195555
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:emu-linux-x87-xlibs:7.0_r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39A99E8D-7B9B-4822-8550-5FB725F821CC" }, { "criteria": "cpe:2.3:a:x.org:x11r6:6.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76FFBC43-2178-48DF-B61E-CCBA4682AC5E" }, { "criteria": "cpe:2.3:a:x.org:x11r6:6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F506308-E878-4AA5-B5D5-A7E148D63947" }, { "criteria": "cpe:2.3:a:x.org:x11r6:6.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D129D08C-AF18-4F9D-9781-64B8C1CFD65E" }, { "criteria": "cpe:2.3:a:x.org:x11r6:6.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "201EBA98-07CF-4F03-BB9F-694D65F0C118" }, { "criteria": "cpe:2.3:a:x.org:x11r7:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D02D3FA8-EDCD-4A3C-81CF-FC09633270DF" }, { "criteria": "cpe:2.3:a:x.org:x11r7:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3D35005-EEB1-4FA1-95B5-EFF2ABC31AD3" }, { "criteria": "cpe:2.3:a:x.org:x11r7:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEDE33C3-5385-4457-A058-F43B08EFFFCA" }, { "criteria": "cpe:2.3:a:x.org:xdm:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "388D6C4A-04DE-49B3-8B4B-30CC07961F70" }, { "criteria": "cpe:2.3:a:x.org:xf86dga:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DF163B1-8093-4E18-AF67-D97C22C205CD" }, { "criteria": "cpe:2.3:a:x.org:xinit:1.0.2_r5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D136635-B0EB-4714-95F0-F7341BB4558C" }, { "criteria": "cpe:2.3:a:x.org:xload:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A75541A-E933-4292-B7D7-B4960745D717" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.02_r5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A956491-A5FB-4848-8C06-D7BC66B0B614" }, { "criteria": "cpe:2.3:a:x.org:xterm:214:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A86C489-290F-4B62-BC6E-7934ACE57DFA" } ], "operator": "OR" } ] } ]