{"id":"CVE-2006-0745","details":"X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.","modified":"2026-04-10T03:38:22.619731Z","published":"2006-03-21T02:06:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/19256"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19307"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19311"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19316"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19676"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:056"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_16_xorgx11server.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/1017"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/1028"},{"type":"EVIDENCE","url":"http://www.securityfocus.com/bid/17169"},{"type":"FIX","url":"http://www.securityfocus.com/bid/17169"},{"type":"WEB","url":"http://securityreason.com/securityalert/606"},{"type":"WEB","url":"http://securitytracker.com/id?1015793"},{"type":"WEB","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1"},{"type":"WEB","url":"http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm"},{"type":"WEB","url":"http://www.osvdb.org/24000"},{"type":"WEB","url":"http://www.osvdb.org/24001"},{"type":"WEB","url":"http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00026.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/428183/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/428230/100/0/threaded"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25341"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1697"}],"schema_version":"1.7.5"}