X.Org Xorg-Server vulnerabilities

124 known vulnerabilities affecting x.org/xorg-server.

Total CVEs
124
CISA KEV
0
Public exploits
5
Exploited in wild
1
Severity breakdown
CRITICAL21HIGH58MEDIUM38LOW7

Vulnerabilities

Page 7 of 7
CVE-2006-6103MEDIUMCVSS 6.6≥ 0, < 2:1.1.1-152006-12-31
CVE-2006-6103 [MEDIUM] CVE-2006-6103: Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
osv
CVE-2006-4447HIGHCVSS 7.2v1.02_r52006-08-30
CVE-2006-4447 [HIGH] CVE-2006-4447: X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check t X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit.
nvdosv
CVE-2006-1526LOWCVSS 2.1≥ 0, < 1:1.0.2-82006-05-02
CVE-2006-1526 [LOW] CVE-2006-1526: Buffer overflow in the X render (Xrender) extension in X Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&" instead of a "*" operator. NOTE: the subject
osv
CVE-2006-0745HIGHCVSS 7.2PoC≥ 0, < 1:1.0.2-12006-03-21
CVE-2006-0745 [HIGH] CVE-2006-0745: X X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.
osv