CVE-2024-21886
Xorg-x11-server: heap buffer overflow in disabledevice
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.
Se encontró una falla de desbordamiento de búfer de almacenamiento dinámico en la función DisableDevice en el servidor X.Org. Este problema puede provocar un bloqueo de la aplicación o, en algunas circunstancias, la ejecución remota de código en entornos de reenvío SSH X11.
This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DisableDevice function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-01-02 CVE Reserved
- 2024-01-17 CVE Published
- 2024-05-01 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (16)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:0320 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0557 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0558 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0597 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0607 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0614 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0617 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0621 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0626 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:0629 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:2169 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:2170 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:2995 | 2024-05-22 | |
https://access.redhat.com/errata/RHSA-2024:2996 | 2024-05-22 | |
https://access.redhat.com/security/cve/CVE-2024-21886 | 2024-05-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2256542 | 2024-05-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
- | - | - | - | - |