CVE-2024-21885
Xorg-x11-server: heap buffer overflow in xisenddevicehierarchyevent
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
Se encontró una falla en el servidor X.Org. En la función XISendDeviceHierarchyEvent, es posible exceder la longitud de la matriz asignada cuando se agregan ciertos ID de dispositivo nuevos a la estructura xXIHierarchyInfo. Esto puede desencadenar una condición de desbordamiento de búfer de almacenamiento dinámico, lo que puede provocar un bloqueo de la aplicación o la ejecución remota de código en entornos de reenvío SSH X11.
This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the XISendDeviceHierarchyEvent function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-01-02 CVE Reserved
- 2024-01-17 CVE Published
- 2024-05-01 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20240503-0004 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:0320 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0557 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0558 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0597 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0607 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0614 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0617 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0621 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0626 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:0629 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:2169 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:2170 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:2995 | 2024-07-03 | |
https://access.redhat.com/errata/RHSA-2024:2996 | 2024-07-03 | |
https://access.redhat.com/security/cve/CVE-2024-21885 | 2024-05-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2256540 | 2024-05-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
- | - | - | - | - |