Lucene search

K
redosRedosROS-2-440
HistorySep 08, 2021 - 12:00 a.m.

ROS-2-440

2021-09-0800:00:00
redos.red-soft.ru
6

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.7%

2.440 Vulnerability in X.Org Server and libX11 (CVE-2020-14347, CVE-2020-14344)

1. Vulnerability Description:

CVE-2020-14347 - Failure to initialize memory when allocating buffers for pixel maps using the AllocatePixmap() call could cause the X client to leak memory contents from the heap when the X server is running with elevated privileges. CVE-2020-14344 is an integer overflow in the XIM (Input Method) implementation of libX11 that can cause corruption of memory regions in the heap when processing specially-formatted messages from the input method.Identifier of the Information Security Threat Data Bank of the FSTEC of Russia: BDU:2020-03916, BDU:2020-03915

2. Possible measures to eliminate the vulnerability

Install security updates for the following packages: libX11* and xorg-x11The updates can be installed in the following ways:**a) if the computer with the installed OS version has access to the vendor’s official repository, run the update as administrator with the command:# yum updateAfter the list of updated packages is displayed, agree to apply the updates by pressingYon the keyboard. Wait until the updates installation is complete and make sure that there are no errors during their installation.b)If the computer with the installed OS version does not have access to the vendor’s official repository, you should perform the following actions: - download the updated package (and dependencies if necessary): http://repo.red-soft.ru/redos/7.2c/x86_64/updates/ Check the package integrity and authenticity by instructionsInstall the downloaded package with the command:`# yum localinstall libX11 xorg-x11``When the list of updated packages is displayed, agree to apply the updates by pressingY* on the keyboard. Wait for the updates to finish installing and make sure there are no errors during installation.

Date of last modification: 08.09.2021

OSVersionArchitecturePackageVersionFilename
redosunknown<= UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.7%