11-01-2018, 03:32 AM
Hi everyone! Hope you're all having a ice life! 
Just found this article https://www.securepatterns.com/2018/10/c...erver.html while googling. I don't mean to raise any alarms whatsoever, just wondering whether this has been addressed...do we even have to worry about this issue?
From the article:
"X.org X Server application is vulnerable to privilege escalation issue. X.org X Server application allows lower privileged user to create or overwrite file anywhere on system , including files owned by privileged users (ex. /etc/shadow).
The attacker needs to have active console session to exploit this issue."

Just found this article https://www.securepatterns.com/2018/10/c...erver.html while googling. I don't mean to raise any alarms whatsoever, just wondering whether this has been addressed...do we even have to worry about this issue?
From the article:
"X.org X Server application is vulnerable to privilege escalation issue. X.org X Server application allows lower privileged user to create or overwrite file anywhere on system , including files owned by privileged users (ex. /etc/shadow).
The attacker needs to have active console session to exploit this issue."
Without each others help there ain't no hope for us 
Need a translation service? https://www.deepl.com/es/translator

Need a translation service? https://www.deepl.com/es/translator


![[Image: X5qGkCg.png]](https://imgur.com/X5qGkCg.png)
![[Image: 0op1GNe.png]](https://i.imgur.com/0op1GNe.png)
![[Image: LgJ2mtP.png]](https://i.imgur.com/LgJ2mtP.png)
![[Image: vLZcFUE.png]](https://imgur.com/vLZcFUE.png)
![[Image: lrUHro3.jpg]](https://i.imgur.com/lrUHro3.jpg)