CVE-2006-4447 (CNNVD-200608-478)
HIGH
中文标题:
X.Org多个setuid调用返回检查本地权限提升漏洞
英文标题:
X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check t...
CVSS分数:
7.2
发布时间:
2006-08-30 01:00:00
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
X.Org是X.Org基金会运作的一个对X Window系统的官方参考实现,是开源的自由软件。 X.Org在处理权限放弃操作时存在漏洞,本地攻击者可能利用此漏洞提升自己的权限。 X.Org没有检查setuid()或类似的调用是否成功。如果由于"maximum processes"ulimit的限制导致调用失败的话,就会导致进程以root用户权限执行某些特权操作(文件访问)。
英文描述:
X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit.
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| x.org | emu-linux-x87-xlibs | 7.0_r1 | - | - |
cpe:2.3:a:x.org:emu-linux-x87-xlibs:7.0_r1:*:*:*:*:*:*:*
|
| x.org | x11r6 | 6.7.0 | - | - |
cpe:2.3:a:x.org:x11r6:6.7.0:*:*:*:*:*:*:*
|
| x.org | x11r6 | 6.8 | - | - |
cpe:2.3:a:x.org:x11r6:6.8:*:*:*:*:*:*:*
|
| x.org | x11r6 | 6.8.1 | - | - |
cpe:2.3:a:x.org:x11r6:6.8.1:*:*:*:*:*:*:*
|
| x.org | x11r6 | 6.8.2 | - | - |
cpe:2.3:a:x.org:x11r6:6.8.2:*:*:*:*:*:*:*
|
| x.org | x11r7 | 1.0 | - | - |
cpe:2.3:a:x.org:x11r7:1.0:*:*:*:*:*:*:*
|
| x.org | x11r7 | 1.0.1 | - | - |
cpe:2.3:a:x.org:x11r7:1.0.1:*:*:*:*:*:*:*
|
| x.org | x11r7 | 1.0.2 | - | - |
cpe:2.3:a:x.org:x11r7:1.0.2:*:*:*:*:*:*:*
|
| x.org | xdm | 1.0.3 | - | - |
cpe:2.3:a:x.org:xdm:1.0.3:*:*:*:*:*:*:*
|
| x.org | xf86dga | 1.0.0 | - | - |
cpe:2.3:a:x.org:xf86dga:1.0.0:*:*:*:*:*:*:*
|
| x.org | xinit | 1.0.2_r5 | - | - |
cpe:2.3:a:x.org:xinit:1.0.2_r5:*:*:*:*:*:*:*
|
| x.org | xload | 1.0.0 | - | - |
cpe:2.3:a:x.org:xload:1.0.0:*:*:*:*:*:*:*
|
| x.org | xorg-server | 1.02_r5 | - | - |
cpe:2.3:a:x.org:xorg-server:1.02_r5:*:*:*:*:*:*:*
|
| x.org | xterm | 214 | - | - |
cpe:2.3:a:x.org:xterm:214:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
21660
third-party-advisory
cve.org
访问
cve.org
MDKSA-2006:160
vendor-advisory
cve.org
访问
cve.org
[xorg] 20060620 X.Org security advisory: setuid return value check problems
mailing-list
cve.org
访问
cve.org
VU#300368
third-party-advisory
cve.org
访问
cve.org
ADV-2006-3409
vdb-entry
cve.org
访问
cve.org
21693
third-party-advisory
cve.org
访问
cve.org
DSA-1193
vendor-advisory
cve.org
访问
cve.org
GLSA-200704-22
vendor-advisory
cve.org
访问
cve.org
22332
third-party-advisory
cve.org
访问
cve.org
ADV-2007-0409
vdb-entry
cve.org
访问
cve.org
GLSA-200608-25
vendor-advisory
cve.org
访问
cve.org
23697
vdb-entry
cve.org
访问
cve.org
25059
third-party-advisory
cve.org
访问
cve.org
25032
third-party-advisory
cve.org
访问
cve.org
[beast] 20061228 ANNOUNCE: BEAST/BSE v0.7.1
mailing-list
cve.org
访问
cve.org
19742
vdb-entry
cve.org
访问
cve.org
21650
third-party-advisory
cve.org
访问
cve.org
CVSS评分详情
7.2
HIGH
CVSS向量:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS版本:
2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2006-08-30 01:00:00
修改时间:
2024-08-07 19:14:46
创建时间:
2025-11-11 15:32:36
更新时间:
2025-11-11 15:49:09
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-4447 |
2025-11-11 15:17:44 | 2025-11-11 07:32:36 |
| NVD | nvd_CVE-2006-4447 |
2025-11-11 14:51:50 | 2025-11-11 07:41:22 |
| CNNVD | cnnvd_CNNVD-200608-478 |
2025-11-11 15:08:51 | 2025-11-11 07:49:09 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:09
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200608-478; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200608-478
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:22
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.2; cvss_vector: NOT_EXTRACTED → AV:L/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 14; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.2
- cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 14
- data_sources: ['cve'] -> ['cve', 'nvd']