4.6
CVSSv2

CVE-2017-13723

Published: 10/10/2017 Updated: 04/02/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In X.Org Server (aka xserver and xorg-server) prior to 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.

Vulnerable Product Search on Vulmon Subscribe to Product

x.org xorg-server

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Several vulnerabilities have been discovered in the XOrg X server An attacker who's able to connect to an X server could cause a denial of service or potentially the execution of arbitrary code For the oldstable distribution (jessie), these problems have been fixed in version 2:1164-1+deb8u2 For the stable distribution (stretch), these proble ...
In XOrg Server (aka xserver and xorg-server) before 1194, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp ...
A stack buffer overflow was found in xkbtextc, which didn't handle xkb formatted string output safely due to a single shared static buffer The fix introduces a ring of resizable buffers to avoid problems when strings end up longer than anticipated This vulnerability may potentially lead to privilege escalation when the xorg-server is running wit ...