Vulnerability Name: | CVE-2004-0419 (CCN-16264) | ||||||||||||
Assigned: | 2004-05-19 | ||||||||||||
Published: | 2004-05-19 | ||||||||||||
Updated: | 2017-10-11 | ||||||||||||
Summary: | XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CONFIRM Type: UNKNOWN http://bugs.xfree86.org/show_bug.cgi?id=1376 Source: MITRE Type: CNA CVE-2004-0419 Source: CCN Type: RHSA-2004-478 XFree86 security update Source: SECUNIA Type: UNKNOWN 12019 Source: CCN Type: SECTRACK ID: 1010306 Xdm May Open Random TCP Sockets Source: SECTRACK Type: UNKNOWN 1010306 Source: CCN Type: CIAC Information Bulletin P-001 Red Hat Updated XFree86 Packages fix Security Issues Source: CIAC Type: UNKNOWN P-001 Source: CCN Type: GLSA-200407-05 XFree86, X.org: XDM ignores requestPort setting Source: GENTOO Type: Vendor Advisory GLSA-200407-05 Source: MANDRAKE Type: Patch, Vendor Advisory MDKSA-2004:073 Source: OPENBSD Type: UNKNOWN 20040526 008: SECURITY FIX: May 26, 2004 Source: REDHAT Type: UNKNOWN RHSA-2004:478 Source: BID Type: Patch, Vendor Advisory 10423 Source: CCN Type: BID-10423 XFree86 XDM RequestPort Random Open TCP Socket Vulnerability Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124900 Source: XF Type: UNKNOWN xdm-socket-gain-access(16264) Source: XF Type: UNKNOWN xdm-socket-gain-access(16264) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10161 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |