CVE-2017-10971Improper Restriction of Operations within the Bounds of a Memory Buffer in X Server

Severity
8.8HIGHNVD
EPSS
2.6%
top 14.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 6
Latest updateMay 17

Description

In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

Debianx.org/xorg-server< 2:1.19.3-2+3
Ubuntux.org/xorg-server< 2:1.15.1-0ubuntu2.9+1
NVDx.org/x_server1.19.3

🔴Vulnerability Details

4
GHSA
GHSA-8jfp-8hq7-6gj5: In the X2022-05-17
OSV
xorg-server, xorg-server-hwe-16.04, xorg-server-lts-xenial vulnerabilities2017-07-24
OSV
CVE-2017-10971: In the X2017-07-06
CVEList
CVE-2017-10971: In the X2017-07-06

📋Vendor Advisories

3
Ubuntu
X.Org X server vulnerabilities2017-07-24
Red Hat
xorg-x11-server: Stack overflow in the endianness conversion of X Events2017-06-19
Debian
CVE-2017-10971: xorg-server - In the X.Org X server before 2017-06-19, a user authenticated to an X Session co...2017

💬Community

2
Bugzilla
CVE-2017-10971 xorg-x11-server: Stack overflow in the endianness conversion of X Events2017-07-20
Bugzilla
CVE-2017-10971 CVE-2017-10972 xorg-x11-server: various flaws [fedora-all]2017-07-20
CVE-2017-10971 — X.org X Server vulnerability | cvebase