Users login

Create an account »


Users login

Home » Hacking News » FreeBSD-SA-01:19 Security Advisory

FreeBSD-SA-01:19 Security Advisory

by Phiber on February 8th, 2001 The ja-xklock port, versions 2.7.1 and earlier, contains an exploitable buffer overflow. Because the xklock program is also setuid root, unprivileged local users may gain root privileges on the local system.....

Because the ja-xklock port is unmaintained and due to the software's
age, this vulnerability has not yet been corrected. Additionally, the
ja-xklock port is scheduled for removal from the ports system if it
has not been audited and fixed within one month of discovery. In the
event the ja-xlock port is corrected, this advisory will be rereleased
with updated information.

The ja-xklock port is not installed by default, nor is it "part of
FreeBSD" as such: it is part of the FreeBSD ports collection, which
contains over 4500 third-party applications in a ready-to-install
format. The ports collections shipped with FreeBSD 3.5.1 and 4.2
contain this problem since it was discovered after the releases.

FreeBSD makes no claim about the security of these third-party
applications, although an effort is underway to provide a security
audit of the most security-critical ports.

Quick Fix: Deinstall the ja-xklock port/package, if you have installed it.

Download this advisory


Visit FreeBSD

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »