Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-31080

Опубликовано: 03 апр. 2024
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

Отчет

The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10tigervncNot affected
Red Hat Enterprise Linux 10xorg-x11-serverNot affected
Red Hat Enterprise Linux 10xorg-x11-server-XwaylandNot affected
Red Hat Enterprise Linux 6tigervncOut of support scope
Red Hat Enterprise Linux 6xorg-x11-serverOut of support scope
Red Hat Enterprise Linux 7xorg-x11-serverFixedRHSA-2024:178511.04.2024
Red Hat Enterprise Linux 7tigervncFixedRHSA-2024:208029.04.2024
Red Hat Enterprise Linux 8tigervncFixedRHSA-2024:203724.04.2024
Red Hat Enterprise Linux 8xorg-x11-serverFixedRHSA-2024:325822.05.2024
Red Hat Enterprise Linux 8tigervncFixedRHSA-2024:326122.05.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-126
https://bugzilla.redhat.com/show_bug.cgi?id=2271997xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents

EPSS

Процентиль: 32%
0.00123
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
nvd
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 7.3
debian
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org ser ...

CVSS3: 7.3
github
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

EPSS

Процентиль: 32%
0.00123
Низкий

7.3 High

CVSS3