Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-31080

Опубликовано: 03 апр. 2024
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

Отчет

The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tigervncOut of support scope
Red Hat Enterprise Linux 6xorg-x11-serverOut of support scope
Red Hat Enterprise Linux 7xorg-x11-serverFixedRHSA-2024:178511.04.2024
Red Hat Enterprise Linux 7tigervncFixedRHSA-2024:208029.04.2024
Red Hat Enterprise Linux 8tigervncFixedRHSA-2024:203724.04.2024
Red Hat Enterprise Linux 8xorg-x11-serverFixedRHSA-2024:325822.05.2024
Red Hat Enterprise Linux 8tigervncFixedRHSA-2024:326122.05.2024
Red Hat Enterprise Linux 8xorg-x11-server-XwaylandFixedRHSA-2024:334323.05.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupporttigervncFixedRHSA-2024:204124.04.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update ServicetigervncFixedRHSA-2024:204124.04.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-126
https://bugzilla.redhat.com/show_bug.cgi?id=2271997xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents

EPSS

Процентиль: 29%
0.00102
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
nvd
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.3
debian
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org ser ...

CVSS3: 7.3
github
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

EPSS

Процентиль: 29%
0.00102
Низкий

7.3 High

CVSS3