CVE编号
CVE-2006-6103利用情况
暂无补丁情况
N/A披露时间
2006-12-31漏洞描述
X.Org 6.8.2、6.9.0、7.0和7.1和XFree86X服务器的DBE扩展中ProcDbeSwapBuffers函数中的整数溢出允许本地用户通过精心编制的X协议请求执行任意代码,该请求在处理未指定的数据结构时触发内存损坏。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc | |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&o... | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465 | |
http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html | |
http://osvdb.org/32086 | |
http://secunia.com/advisories/23633 | |
http://secunia.com/advisories/23670 | |
http://secunia.com/advisories/23684 | |
http://secunia.com/advisories/23689 | |
http://secunia.com/advisories/23698 | |
http://secunia.com/advisories/23705 | |
http://secunia.com/advisories/23758 | |
http://secunia.com/advisories/23789 | |
http://secunia.com/advisories/23966 | |
http://secunia.com/advisories/24168 | |
http://secunia.com/advisories/24210 | |
http://secunia.com/advisories/24247 | |
http://secunia.com/advisories/24401 | |
http://secunia.com/advisories/25802 | |
http://security.gentoo.org/glsa/glsa-200701-25.xml | |
http://securitytracker.com/id?1017495 | |
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackw... | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1 | |
http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm | |
http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:005 | |
http://www.novell.com/linux/security/advisories/2007_08_x.html | |
http://www.redhat.com/support/errata/RHSA-2007-0002.html | |
http://www.redhat.com/support/errata/RHSA-2007-0003.html | |
http://www.securityfocus.com/bid/21968 | |
http://www.ubuntu.com/usn/usn-403-1 | |
http://www.vupen.com/english/advisories/2007/0108 | |
http://www.vupen.com/english/advisories/2007/0109 | |
http://www.vupen.com/english/advisories/2007/0589 | |
http://www.vupen.com/english/advisories/2007/0669 | |
http://www.vupen.com/english/advisories/2007/2233 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31379 | |
https://issues.rpath.com/browse/RPL-920 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://www.debian.org/security/2007/dsa-1249 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | x.org | x.org | 6.8.2 | - | |||||
运行在以下环境 | |||||||||
应用 | x.org | x.org | 6.9.0 | - | |||||
运行在以下环境 | |||||||||
应用 | x.org | x.org | 7.0 | - | |||||
运行在以下环境 | |||||||||
应用 | x.org | x.org | 7.1 | - | |||||
运行在以下环境 | |||||||||
应用 | xfree86_project | xfree86 | * | - | |||||
运行在以下环境 | |||||||||
系统 | suse_11 | xorg-x11-Xvnc | * |
Up to (excluding) 7.4-27.19 |
- 攻击路径 本地
- 攻击复杂度 N/A
- 权限要求 一次
- 影响范围 N/A
- 用户交互 无
- 可用性 完全地
- 保密性 完全地
- 完整性 完全地
还没有评论,来说两句吧...