First published: Mon Oct 09 2017(Updated: )
In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | 2:1.20.4-1+deb10u4 2:1.20.4-1+deb10u9 2:1.20.11-1+deb11u6 2:21.1.7-3 2:21.1.8-1 | |
X.Org Xserver | <=1.19.3 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13721 has a high severity rating due to its potential for causing X server aborts and malicious manipulation of shared memory segments.
To fix CVE-2017-13721, update the X.Org Server to a version that is 1.19.4 or higher, such as 2:1.20.4-1+deb10u4.
CVE-2017-13721 affects systems running X.Org Server versions prior to 1.19.4, specifically on Debian GNU/Linux 8.0 and 9.0.
CVE-2017-13721 requires local access since the attacker must be authenticated to the X server to exploit the vulnerability.
The impact of CVE-2017-13721 can lead to service disruptions as it allows an attacker to abort the X server or alter shared memory segments of other X clients.