In gksu-polkit before 0.0.3, the source file for xauth may contain arbitrary commands that may allow an attacker to overtake an administrator X11 session.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-0703 | third party advisory |
https://access.redhat.com/security/cve/cve-2011-0703 | broken link |