First published: Wed Oct 16 2019(Updated: )
"" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact. Note: It is disputed if the X.Org X Server is involved or if there is a stack overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org X Server | <=1.20.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-17624.
The severity of CVE-2019-17624 is high with a severity value of 7.8.
The affected software of CVE-2019-17624 is X.Org X Server version 1.20.4.
In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap, which can lead to a denial of service or other unspecified impact.
Yes, here are the references for CVE-2019-17624: [Packet Storm Security](http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html), [Exploit-DB](https://www.exploit-db.com/exploits/47507), [X.Org Releases](https://www.x.org/releases/individual/xserver/).