First published: Mon Apr 26 2021(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of XChangeFeedbackControl requests. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org Server | ||
debian/xorg-server | 2:1.20.4-1+deb10u4 2:1.20.4-1+deb10u9 2:1.20.11-1+deb11u6 2:21.1.7-3 2:21.1.8-1 | |
X.Org X Server | <1.20.11 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3472 is a vulnerability in X.Org Server that allows local attackers to escalate privileges on affected installations.
CVE-2021-3472 allows local attackers to escalate privileges on affected installations of X.Org Server.
CVE-2021-3472 has a severity rating of high.
To exploit CVE-2021-3472, an attacker must first obtain the ability to execute low-privileged code on the target system.
The remedy for CVE-2021-3472 is to update X.Org Server to versions 2:1.20.4-1+deb10u4, 2:1.20.4-1+deb10u9, 2:1.20.11-1+deb11u6, 2:21.1.7-3, or 2:21.1.8-1.