First published: Mon Oct 09 2017(Updated: )
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | 2:1.20.4-1+deb10u4 2:1.20.4-1+deb10u9 2:1.20.11-1+deb11u6 2:21.1.7-3 2:21.1.8-1 | |
X.Org Xserver | <=1.19.3 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13723 has a high severity rating due to its potential to cause crashes and disruption in X server operations.
To fix CVE-2017-13723, update the xorg-server package to version 1.19.4 or later.
CVE-2017-13723 affects systems running versions of xorg-server prior to 1.19.4, specifically on Debian GNU/Linux.
CVE-2017-13723 enables local authenticated attackers to exploit a buffer overflow vulnerability in the X server.
No, CVE-2017-13723 is not a remote vulnerability; it requires local authentication to the X server.