Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-31081

Опубликовано: 03 апр. 2024
Источник: redhat
CVSS3: 7.3

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

Отчет

Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10tigervncNot affected
Red Hat Enterprise Linux 10xorg-x11-serverNot affected
Red Hat Enterprise Linux 10xorg-x11-server-XwaylandNot affected
Red Hat Enterprise Linux 6xorg-x11-serverOut of support scope
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONtigervncFixedRHSA-2025:1275104.08.2025
Red Hat Enterprise Linux 7xorg-x11-serverFixedRHSA-2024:178511.04.2024
Red Hat Enterprise Linux 7tigervncFixedRHSA-2024:208029.04.2024
Red Hat Enterprise Linux 8tigervncFixedRHSA-2024:203724.04.2024
Red Hat Enterprise Linux 8xorg-x11-serverFixedRHSA-2024:325822.05.2024
Red Hat Enterprise Linux 8tigervncFixedRHSA-2024:326122.05.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-126
https://bugzilla.redhat.com/show_bug.cgi?id=2271998xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
nvd
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 7.3
debian
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org ser ...

CVSS3: 7.3
github
больше 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

7.3 High

CVSS3