CVE-2017-13723
Published: August 31, 2023Last modified: August 31, 2023
Description
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | xorg-server | Not affected (21.1.8-r0) |
Stream | xorg-server | Not affected (21.1.8-r3) |
References
- http://www.debian.org/security/2017/dsa-4000
- http://www.openwall.com/lists/oss-security/2017/10/04/10
- http://www.securityfocus.com/bid/101253
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
- https://lists.x.org/archives/xorg-announce/2017-October/002808.html
- https://security.gentoo.org/glsa/201710-30