Professional Webmasters Community
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Exploiting large memory management vulnerabilities in Xorg server running on Linux

Go down

Exploiting large memory management vulnerabilities in Xorg server running on Linux Empty Exploiting large memory management vulnerabilities in Xorg server running on Linux

Post  andry Mon Jan 03, 2011 4:12 am

A malicious authenticated client can force Xorg server to exhaust (or fragment) its address space. If running on Linux,this may result in the process stack top being in an unexpected region and execution of arbitrary code with server priv-ileges (root).x86 32 and x86 64 platforms are aected, others most probably are aected,too.Note that depending on the system con guration, by default local unpriv-ileged users may be able to start an instance of Xorg server that requires no authentication and exploit it.Also if a remote attacker exploits a (unrelated) vulnerability in a GUI application (e.g. web browser),he will have ability to attack X server.
In case of a local attacker that can use MIT-SHM extension (which is the most likely scenario),the exploit is very reliable.Identi er CVE-2010-2240 has been reserved for the underlying issue (Linux kernel not providing stack and heap separation).This issue has been known for at least five years.

Download PDF
andry
andry
Moderator
Moderator

Posts : 467
Join date : 2010-05-07

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum