Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:5FE9E9BCB4A07ABD9F1A705E3DD977FC
HistoryNov 09, 2023 - 12:00 a.m.

USN-6407-2: libx11 vulnerabilities | Cloud Foundry

2023-11-0900:00:00
Cloud Foundry
www.cloudfoundry.org
15
canonical ubuntu
libx11
vulnerabilities
cloud foundry
cve-2023-43785
cve-2023-43786
cve-2023-43787
mitigation
upgrade

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

5.1%

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 16.04
  • Canonical Ubuntu 18.04

Description

USN-6407-1 fixed several vulnerabilities in libx11. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: Gregory James Duck discovered that libx11 incorrectly handled certain keyboard symbols. If a user were tricked into connecting to a malicious X server, a remote attacker could use this issue to cause libx11 to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-43785) Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. (CVE-2023-43786) Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could use this issue to cause libx11 to crash, leading to a denial of service, or possibly execute arbitrary code. (CVE-2023-43787) Update Instructions: Run sudo pro fix USN-6407-2 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libx11-6 – 2:1.6.3-1ubuntu2.2+esm4 libx11-data – 2:1.6.3-1ubuntu2.2+esm4 libx11-xcb-dev – 2:1.6.3-1ubuntu2.2+esm4 libx11-xcb1 – 2:1.6.3-1ubuntu2.2+esm4 libx11-doc – 2:1.6.3-1ubuntu2.2+esm4 libx11-dev – 2:1.6.3-1ubuntu2.2+esm4 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro

CVEs contained in this USN include: CVE-2023-43785, CVE-2023-43786, CVE-2023-43787.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • CF Deployment
    • All versions prior to 30.0.0

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • CF Deployment
    • Upgrade all versions to 30.0.0 or greater

References

History

2023-11-09: Initial vulnerability report published.

Affected configurations

Vulners
Node
cloudfoundrycf-deploymentRange<30.0.0

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

5.1%