ID CVE-2011-2504
Summary Untrusted search path vulnerability in x11perfcomp in XFree86 x11perf before 1.5.4 allows local users to gain privileges via unspecified Trojan horse code in the current working directory.
References
Vulnerable Configurations
  • xfree86 x11perf 1.5.3
    cpe:2.3:a:xfree86:x11perf:1.5.3
  • xfree86 x11perf 1.5.2
    cpe:2.3:a:xfree86:x11perf:1.5.2
  • xfree86 x11perf 1.5.1
    cpe:2.3:a:xfree86:x11perf:1.5.1
  • xfree86 x11perf 1.5
    cpe:2.3:a:xfree86:x11perf:1.5
CVSS
Base: 6.9 (as of 22-03-2013 - 15:48)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-0502.NASL
    description Updated core client packages for the X Window System that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Core X11 clients packages provide the xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps clients that ship with the X Window System. It was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker-controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. (BZ#835277, BZ#835278, BZ#835281) All users of xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 64753
    published 2013-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64753
    title RHEL 6 : Core X11 clients (RHSA-2013:0502)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20130221_CORE_X11_CLIENTS_ON_SL6_X.NASL
    description It was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker- controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. *xorg ABI change With this update there is a change in the X.org ABI for the video drivers. This change will require compatible drivers. Anyone using the drivers shipped with SL should have no problems. Anyone using drivers from an external source - such as nVidia, ATI, or ELRepo should ensure a compatible driver is loaded. Please ensure you are on the most recent compatible driver before updating the system. --
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 65563
    published 2013-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65563
    title Scientific Linux Security Update : Core X11 clients on SL6.x i386/x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-0502.NASL
    description Updated core client packages for the X Window System that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Core X11 clients packages provide the xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps clients that ship with the X Window System. It was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker-controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. (BZ#835277, BZ#835278, BZ#835281) All users of xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65137
    published 2013-03-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65137
    title CentOS 6 : xorg-x11-apps / xorg-x11-server-utils / xorg-x11-utils (CESA-2013:0502)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-0502.NASL
    description From Red Hat Security Advisory 2013:0502 : Updated core client packages for the X Window System that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Core X11 clients packages provide the xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps clients that ship with the X Window System. It was found that the x11perfcomp utility included the current working directory in its PATH environment variable. Running x11perfcomp in an attacker-controlled directory would cause arbitrary code execution with the privileges of the user running x11perfcomp. (CVE-2011-2504) Also with this update, the xorg-x11-utils and xorg-x11-server-utils packages have been upgraded to upstream version 7.5, and the xorg-x11-apps package to upstream version 7.6, which provides a number of bug fixes and enhancements over the previous versions. (BZ#835277, BZ#835278, BZ#835281) All users of xorg-x11-utils, xorg-x11-server-utils, and xorg-x11-apps are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68742
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68742
    title Oracle Linux 6 : Core X11 clients (ELSA-2013-0502)
redhat via4
advisories
bugzilla
id 717672
title CVE-2011-2504 x11perfcomp has dot in its path
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhba:tst:20111656001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhba:tst:20111656002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20111656004
  • OR
    • AND
      • comment xorg-x11-utils is earlier than 0:7.5-6.el6
        oval oval:com.redhat.rhsa:tst:20130502005
      • comment xorg-x11-utils is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20130502006
    • AND
      • comment xorg-x11-server-utils is earlier than 0:7.5-13.el6
        oval oval:com.redhat.rhsa:tst:20130502007
      • comment xorg-x11-server-utils is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20141376158
    • AND
      • comment xorg-x11-apps is earlier than 0:7.6-6.el6
        oval oval:com.redhat.rhsa:tst:20130502009
      • comment xorg-x11-apps is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20141376156
rhsa
id RHSA-2013:0502
released 2013-02-21
severity Low
title RHSA-2013:0502: Core X11 clients security, bug fix, and enhancement update (Low)
rpms
  • xorg-x11-utils-0:7.5-6.el6
  • xorg-x11-server-utils-0:7.5-13.el6
  • xorg-x11-apps-0:7.6-6.el6
refmap via4
bid 58082
misc https://bugzilla.redhat.com/show_bug.cgi?id=717672
mlist [xorg-announce] 20110727 [ANNOUNCE] x11perf 1.5.4
xf x11perf-priv-esc(82241)
Last major update 22-03-2013 - 00:00
Published 08-03-2013 - 17:55
Last modified 28-08-2017 - 21:29
Back to Top