Описание
ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac option to the X server on each LTSP client, which allows remote attackers to connect to this server via TCP port 6006 (aka display :6).
ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac option to the X server on each LTSP client, which allows remote attackers to connect to this server via TCP port 6006 (aka display :6).
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-1293
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42080
- https://usn.ubuntu.com/610-1
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462
- http://secunia.com/advisories/29959
- http://secunia.com/advisories/30099
- http://www.debian.org/security/2008/dsa-1561
- http://www.openwall.com/lists/oss-security/2008/03/11/2
- http://www.openwall.com/lists/oss-security/2008/03/12/3
- http://www.securityfocus.com/bid/28960
- http://www.securitytracker.com/id?1019940
EPSS
CVE ID
Связанные уязвимости
ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac option to the X server on each LTSP client, which allows remote attackers to connect to this server via TCP port 6006 (aka display :6).
ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac option to the X server on each LTSP client, which allows remote attackers to connect to this server via TCP port 6006 (aka display :6).
ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
Уязвимости операционной системы Debian GNU/Linux, позволяющие злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
EPSS