First published: Thu Jul 06 2017(Updated: )
In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu X Server Legacy | <=1.19.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10971 has a high severity rating due to the potential for a stack overflow leading to code execution.
To fix CVE-2017-10971, you should update the X.Org X server to version 1.19.4 or higher.
CVE-2017-10971 facilitates attacks that can crash the X server or execute arbitrary code within its context.
Users of X.Org X server versions prior to 1.19.4 who are authenticated to an X Session are affected by CVE-2017-10971.
Exploiting CVE-2017-10971 can lead to denial of service or remote code execution within the X server environment.