This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of XChangeFeedbackControl requests. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org Xserver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-463 is classified as a high-severity privilege escalation vulnerability.
To mitigate ZDI-21-463, users should apply the latest security patches provided by the X.Org development team.
ZDI-21-463 affects installations of the X.Org Server software that are vulnerable to privilege escalation.
ZDI-21-463 is a privilege escalation vulnerability that allows local attackers to gain elevated rights.
An attacker must first execute low-privileged code on the target system before exploiting ZDI-21-463.