7.3
CVE-2024-31082
- EPSS 0.03%
- Published 04.04.2024 14:15:10
- Last modified 21.11.2024 09:12:49
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://gitlab.freedesktop.org/xorg/xserver/
≫
Package
xorg-server
Default Statusunaffected
Version <
21.1.12
Version
1.12.0
Status
affected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 6
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 6
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 7
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 7
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 7.3 | 1.8 | 5.5 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
|
CWE-126 Buffer Over-read
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.