Note: This is an archival copy of Security Sun Alert 201790 as previously published on
Latest version of this security advisory is available from as Sun Alert 1001328.1.
Article ID : 1001328.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2006-05-21
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Vulnerabilities found in the Xorg(1) X11R6.9 and X11R7.0 Server


Release Phase

Solaris 10 Operating System

Bug Id

Date of Workaround Release

Date of Resolved Release


The Xorg X server (see Xorg(1)) is one of the X Window System display servers available on the Solaris x86 platform. A local unprivileged user may be able to create or overwrite any file on the system or execute arbitrary code with elevated privileges due to several security vulnerabilities found in the Xorg X server.

Sun acknowledges, with thanks, the X.Org Foundation for bringing these issues to our attention. Sun also thanks Coverity for donating their 'Coverity Prevent' product to the X.Org Foundation which uncovered these issues.

These issues are referenced in the following document:

CVE-2006-0745 at:

Contributing Factors

These issues can occur in the following releases:

x86 Platform

  • Solaris 10 with patch 118966-14 through 118966-16 and without patch 118966-18

Note: This issue only affects Xorg(1) X server releases 6.9 and 7.0. To determine the version of the Xorg X server the following command can be run:

    $ /usr/X11/bin/Xorg -version
X Window System Version 6.8.0 (Sun Xorg Release 1.1 for Solaris 10)
Release Date: 8 September 2004
X Protocol Version 11, Revision 0, Release 6.8



There are no predictable symptoms that would show if one of the described vulnerabilities has been exploited to execute arbitrary code with elevated privileges. There also aren't any predicable symptoms which would show a system file had been overwritten as it would depend on which file had been modified.


Either of the following options are valid workarounds until the resolution patch can be installed on the system.

1) Backout patch 118966-14/15/16 if possible (i.e. if not freshbitted and not installed without saving files for backout) using patchrm(1M) as the root user. For example:

    # patchrm 118966-14


2) Remove the setuid(2) bit from the Xorg server. For example as the root user the following command can be run:

    # chmod 755 /usr/X11/bin/Xorg

Note that removing the setuid bit from the Xorg server will prevent non-root users from being able to start Xorg on Solaris x86 via the command line (typically via xinit(1)). Xorg will still be available when started via a display manager such as dtlogin(1), gdm(1) or xdm(1).



This issue is addressed in the following releases:

x86 Platform

  • Solaris 10 with patch 118966-18 or later


Modification History
Date: 28-MAR-2006
  • Updated Relief/Workaround and Resolution sections
  • State: Resolved




This solution has no attachment