CVE-2006-0745

X.Org server <1.0.0 - Privilege Escalation

Title source: llm
STIX 2.1

Description

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

Exploits (1)

exploitdb WORKING POC VERIFIED
by H D Moore · textlocallinux
https://www.exploit-db.com/exploits/1596

References (21)

Core 21
Core References
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2006:056
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/428230/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25341
Vendor Advisory vendor-advisory x_refsource_fedora
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00026.html
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/428183/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015793
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19256
Vendor Advisory vendor-advisory x_refsource_sunalert
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/24000
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19676
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19316
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/24001
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1017
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/606
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17169
Vendor Advisory vendor-advisory x_refsource_suse
http://www.novell.com/linux/security/advisories/2006_16_xorgx11server.html
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1028
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19307
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19311
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1697

Scores

EPSS 0.0018
EPSS Percentile 38.9%

Details

Status published
Products (7)
mandrakesoft/mandrake_linux 2006 (2 CPE variants)
redhat/fedora_core core_5.0
sun/solaris 10.0
suse/suse_linux 10.0
x.org/x11r6 6.9
x.org/x11r7 1.0
x.org/x11r7 1.0.1
Published Mar 21, 2006
Tracked Since Feb 18, 2026