Gentoo Logo

X.Org X server: Composite local privilege escalation

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200710-16 / X.Org
Release Date October 14, 2007
Latest Revision October 14, 2007: 01
Impact high
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
x11-base/xorg-server < 1.3.0.0-r1 >= 1.3.0.0-r1 All supported architectures

Related bugreports: #191964

Synopsis

A vulnerability has been discovered in the Composite extension of the X.Org X server, allowing for a local privilege escalation.

2.  Impact Information

Background

The X Window System is a graphical windowing system based on a client/server model.

Description

Aaron Plattner discovered a buffer overflow in the compNewPixmap() function when copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.

Impact

A local attacker could execute arbitrary code with the privileges of the user running the X server, typically root.

3.  Resolution Information

Workaround

Disable the Composite extension by setting ' Option "Composite" "disable" ' in the Extensions section of xorg.conf.

Note: This could affect the functionality of some applications.

Resolution

All X.Org X server users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r1"

4.  References



Print

Page updated October 14, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.