Lucene search

K
redosRedosROS-20240408-08
HistoryApr 08, 2024 - 12:00 a.m.

ROS-20240408-08

2024-04-0800:00:00
redos.red-soft.ru
6
xorg-x11-server package
memory usage
integer overflow
privilege escalation
information disclosure
remote exploitation

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.273 Low

EPSS

Percentile

96.8%

Vulnerability of xorg-x11-server package is related to memory usage after it is freed when processing Button Action objects.
Button Action objects. Exploitation of the vulnerability could allow an attacker to elevate his privileges and
execute arbitrary code in root context

The xorg-server package vulnerability is related to the created requests for RRChangeProviderProperty or
RRChangeOutputProperty causing an integer overflow. Exploitation of the vulnerability could allow
an attacker acting remotely to disclose sensitive information.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64xorg-x11-server-common<= 1.20.14-10UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.273 Low

EPSS

Percentile

96.8%