Vulnerabilità: CVE-2006-6103

Integer overflow nella funzione ProcDbeSwapBuffers nell’estensione DBE per X.Org 6.8.2, 6.9.0, 7.0 e 7.1, e il server XFree86 X, permette agli utenti locali di eseguire codice arbitrario tramite una richiesta artigianale protocollo X che la corruzione della memoria durante il trigger elaborazione di strutture di dati non specificati.


http://www.securityfocus.com/bid/21968
http://support.avaya.com/elmodocs2/security/ASA-2007-066.htm
http://support.avaya.com/elmodocs2/security/ASA-2007-074.htm
https://issues.rpath.com/browse/RPL-920
https://www.debian.org/security/2007/dsa-1249
http://security.gentoo.org/glsa/glsa-200701-25.xml
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465
http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
http://osvdb.org/32086
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011
http://www.redhat.com/support/errata/RHSA-2007-0002.html
http://www.redhat.com/support/errata/RHSA-2007-0003.html
http://securitytracker.com/id?1017495
http://secunia.com/advisories/23633
http://secunia.com/advisories/23670
http://secunia.com/advisories/23684
http://secunia.com/advisories/23689
http://secunia.com/advisories/23698
http://secunia.com/advisories/23705
http://secunia.com/advisories/23758
http://secunia.com/advisories/23789
http://secunia.com/advisories/23966
http://secunia.com/advisories/24168
http://secunia.com/advisories/24210
http://secunia.com/advisories/24247
http://secunia.com/advisories/24401
http://secunia.com/advisories/25802
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
http://www.novell.com/linux/security/advisories/2007_08_x.html
http://www.ubuntu.com/usn/usn-403-1
http://www.vupen.com/english/advisories/2007/0108
http://www.vupen.com/english/advisories/2007/0109
http://www.vupen.com/english/advisories/2007/0589
http://www.vupen.com/english/advisories/2007/0669
http://www.vupen.com/english/advisories/2007/2233
https://exchange.xforce.ibmcloud.com/vulnerabilities/31379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi