Lucene search

K
archlinuxArchLinuxASA-201708-11
HistoryAug 14, 2017 - 12:00 a.m.

[ASA-201708-11] xorg-server: multiple issues

2017-08-1400:00:00
security.archlinux.org
12

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.2%

Arch Linux Security Advisory ASA-201708-11

Severity: High
Date : 2017-08-14
CVE-ID : CVE-2017-10971 CVE-2017-10972
Package : xorg-server
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-341

Summary

The package xorg-server before version 1.19.3-3 is vulnerable to
multiple issues including arbitrary code execution and information
disclosure.

Resolution

Upgrade to 1.19.3-3.

pacman -Syu “xorg-server>=1.19.3-3”

The problems have been fixed upstream but no release is available yet.

Workaround

None.

Description

  • CVE-2017-10971 (arbitrary code execution)

In the X.Org X server on v.1.19.3, a user authenticated to an X Session
could crash or execute code in the context of the X Server by
exploiting a stack overflow in the endianness conversion of X Events.

  • CVE-2017-10972 (information disclosure)

Uninitialized data in endianness conversion in the XEvent handling of
the X.Org X Server on v1.19.3 and before allowed authenticated
malicious users to access potentially privileged data from the X
server.

Impact

A remote attacker can access sensitive information or execute arbitrary
code on the affected host.

References

https://bugzilla.suse.com/show_bug.cgi?id=1035283
https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c
https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d
https://cgit.freedesktop.org/xorg/xserver/commit/?id=ba336b24052122b136486961c82deac76bbde455
https://cgit.freedesktop.org/xorg/xserver/commit/?id=05442de962d3dc624f79fc1a00eca3ffc5489ced
https://security.archlinux.org/CVE-2017-10971
https://security.archlinux.org/CVE-2017-10972

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyxorg-server< 1.19.3-3UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.2%