CVE-2018-14665
Xorg X11 Server (AIX) - Local Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
11Exploited in Wild
-Decision
Descriptions
A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
Se ha descubierto un problema en versiones anteriores a la 1.20.3 de xorg-x11-server. Hay una comprobación incorrecta de permisos para las opciones -modulepath y -logfile al iniciar Xorg. X server permite que usuarios no privilegiados con la capacidad de iniciar sesión en el sistema mediante la consola física escalen sus privilegios y ejecuten código arbitrario con privilegios root.
An incorrect permission check for -modulepath and -logfile options when starting Xorg X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-07-27 CVE Reserved
- 2018-10-25 CVE Published
- 2018-10-27 First Exploit
- 2024-06-13 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-271: Privilege Dropping / Lowering Errors
- CWE-863: Incorrect Authorization
CAPEC
References (27)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/45938 | 2024-08-05 | |
https://www.exploit-db.com/exploits/45832 | 2024-08-05 | |
https://www.exploit-db.com/exploits/45922 | 2024-08-05 | |
https://www.exploit-db.com/exploits/45908 | 2024-08-05 | |
https://www.exploit-db.com/exploits/45697 | 2024-08-05 | |
https://www.exploit-db.com/exploits/45742 | 2024-08-05 | |
https://www.exploit-db.com/exploits/46142 | 2024-08-05 | |
https://www.exploit-db.com/exploits/47701 | 2019-11-20 | |
https://github.com/jas502n/CVE-2018-14665 | 2018-10-27 | |
https://github.com/bolonobolo/CVE-2018-14665 | 2019-03-22 | |
https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:3410 | 2019-10-22 | |
https://security.gentoo.org/glsa/201810-09 | 2019-10-22 | |
https://usn.ubuntu.com/3802-1 | 2019-10-22 | |
https://www.debian.org/security/2018/dsa-4328 | 2019-10-22 | |
https://access.redhat.com/security/cve/CVE-2018-14665 | 2018-10-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1637761 | 2018-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
X.org Search vendor "X.org" | Xorg-server Search vendor "X.org" for product "Xorg-server" | < 1.20.3 Search vendor "X.org" for product "Xorg-server" and version " < 1.20.3" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Aus Search vendor "Redhat" for product "Enterprise Linux Server Aus" | 7.6 Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.6" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Eus Search vendor "Redhat" for product "Enterprise Linux Server Eus" | 7.6 Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.6" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Tus Search vendor "Redhat" for product "Enterprise Linux Server Tus" | 7.6 Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.6" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|