Huawei EulerOS 'libX11' package security update (CVE-2023-3138
Reporter | Title | Published | Views | Family All 132 |
---|---|---|---|---|
![]() | Memory corruption | 28 Jun 202321:15 | – | prion |
![]() | Moderate: libX11 security update | 7 Nov 202300:00 | – | osv |
![]() | RHSA-2023:6497 Red Hat Security Advisory: libX11 security update | 16 Sep 202412:25 | – | osv |
![]() | libx11 - security update | 26 Jun 202300:00 | – | osv |
![]() | libx11 - security update | 21 Jun 202300:00 | – | osv |
![]() | libx11 vulnerability | 20 Jun 202310:12 | – | osv |
![]() | RHSA-2023:7029 Red Hat Security Advisory: libX11 security update | 16 Sep 202412:25 | – | osv |
![]() | RHSA-2024:1417 Red Hat Security Advisory: libX11 security update | 16 Sep 202412:25 | – | osv |
![]() | RHSA-2024:1088 Red Hat Security Advisory: libX11 security update | 16 Sep 202412:25 | – | osv |
![]() | libx11 vulnerability | 15 Jun 202316:51 | – | osv |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2023.2862");
script_cve_id("CVE-2023-3138");
script_tag(name:"creation_date", value:"2023-09-20 04:19:58 +0000 (Wed, 20 Sep 2023)");
script_version("2024-02-05T14:36:57+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:57 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"7.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-07-07 13:05:46 +0000 (Fri, 07 Jul 2023)");
script_name("Huawei EulerOS: Security Advisory for libX11 (EulerOS-SA-2023-2862)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROS\-2\.0SP11\-X86_64");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2023-2862");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2023-2862");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'libX11' package(s) announced via the EulerOS-SA-2023-2862 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.(CVE-2023-3138)");
script_tag(name:"affected", value:"'libX11' package(s) on Huawei EulerOS V2.0SP11(x86_64).");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROS-2.0SP11-x86_64") {
if(!isnull(res = isrpmvuln(pkg:"libX11", rpm:"libX11~1.7.2~2.h5.eulerosv2r11", rls:"EULEROS-2.0SP11-x86_64"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo