NA

CVE-2023-5380

Published: 25/10/2023 Updated: 31/01/2024
CVSS v3 Base Score: 4.7 | Impact Score: 3.6 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of Window objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

Vulnerable Product Search on Vulmon Subscribe to Product

x.org xwayland

x.org x server

redhat enterprise linux 7.0

redhat enterprise linux 8.0

redhat enterprise linux 9.0

fedoraproject fedora 37

fedoraproject fedora 38

fedoraproject fedora 39

debian debian linux 11.0

debian debian linux 12.0

Vendor Advisories

Synopsis Important: tigervnc security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for tigervnc is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having ...
Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server, which may result in privilege escalation if the X server is running privileged For the oldstable distribution (bullseye), these problems have been fixed in version 2:12011-1+deb11u8 For the stable distribution (bookworm), these problems have been fixed in version 2:2117- ...
A out-of-bounds write flaw was found in the xorg-x11-server This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xipropertyc and in RRChangeOutputProperty function in randr/rrpropertyc, allowing for possible escalation of privileges or denial of ser ...
A out-of-bounds write flaw was found in the xorg-x11-server This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xipropertyc and in RRChangeOutputProperty function in randr/rrpropertyc, allowing for possible escalation of privileges or denial of ser ...