Lucene search

K
redosRedosROS-20230419-03
HistoryApr 19, 2023 - 12:00 a.m.

ROS-20230419-03

2023-04-1900:00:00
redos.red-soft.ru
16
x.org server
post-release exploit bug
dangling pointer
compscreen structure
arbitrary code execution
unix

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

15.9%

The X.Org Server vulnerability is related to a post-release exploit bug where, when handling the deletion of a
of a window, Xserver leaves a dangling pointer to that window in the CompScreen structure. Exploitation of the vulnerability
could allow an attacker to cause a post-release usage error and execute arbitrary code
on the system.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64xorg-x11-server-common< 1.20.14-6UNKNOWN

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

15.9%