First published: Fri Jul 27 2018(Updated: )
It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org xorg-server | <=1.19.4 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2624 is a vulnerability found in xorg-x11-server before version 1.19.0 that allows an attacker to attach to an Xorg session by exploiting a weakness in the comparison of MIT cookies.
CVE-2017-2624 has a severity rating of 7, which is considered high.
X.org Xorg-server versions up to and including 1.19.4 and Debian Debian Linux version 7.0 are affected by CVE-2017-2624.
To fix CVE-2017-2624, you should update to a version of xorg-x11-server that is equal to or greater than 1.19.0.
Yes, you can find more information about CVE-2017-2624 at the following sources: [SecurityFocus](http://www.securityfocus.com/bid/96480), [SecurityTracker](http://www.securitytracker.com/id/1037919), and [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624).