Lucene search

K
redosRedosROS-20230419-03
HistoryApr 19, 2023 - 12:00 a.m.

ROS-20230419-03

2023-04-1900:00:00
redos.red-soft.ru
12
x.org server
post-release exploit bug
dangling pointer
compscreen structure
arbitrary code execution
unix

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

16.1%

The X.Org Server vulnerability is related to a post-release exploit bug where, when handling the deletion of a
of a window, Xserver leaves a dangling pointer to that window in the CompScreen structure. Exploitation of the vulnerability
could allow an attacker to cause a post-release usage error and execute arbitrary code
on the system.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64xorg-x11-server-common<= 1.20.14-6UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

16.1%