Feeds

X marks the bug

Linux component flaw deemed 'critical'

Choosing a cloud hosting partner with confidence

Security researchers have discovered a critical vulnerability in the X Window system used in Unix and Linux systems. The buffer overflow vulnerability creates a means for hackers to seize root access to vulnerable systems or launch denial of service attacks. So it's just as well that patches are available.

The flaw stems from programming errors within the XRender extension triangle handling code connected with a missing parentheses. "This can be exploited by a client that is authorised to connect to the X server to cause a buffer overflow," security notification firm Secunia explains.

The error was unearthed using an automated code-scanning tool during an open-source security audit conducted by security firm Coverity and paid for by the US Department of Homeland Security. The vulnerability reportedly affects X11R6.8.x, X11R6.9.0, and X11R7.0 (xorg-server 1.0.x). More info and details of available patches can be found in Secunia's advisory here. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.