1.9
CVSSv2

CVE-2017-2624

Published: 27/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

It was found that xorg-x11-server prior to 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x.org xorg-server

debian debian linux 7.0

Vendor Advisories

Debian Bug report logs - #856398 xorg-server: CVE-2017-2624: Timing attack against MIT Cookie Package: src:xorg-server; Maintainer for src:xorg-server is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 28 Feb 2017 15:51:02 UTC Severity: important Tag ...
It was found that xorg-x11-server before 1190 including uses memcmp() to check the received MIT cookie against a series of valid cookies If the cookie is correct, it is allowed to attach to the Xorg session Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, w ...

Exploits

Xorg suffers from privilege escalation, weak entropy, and use-after-free vulnerabilities ...