This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Xorg-x11-server-extra |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-16070 is critical as it allows local attackers to escalate privileges on affected systems.
To fix ZDI-CAN-16070, you should update the X.Org Server to the latest version that contains the security patch.
ZDI-CAN-16070 affects installations of X.Org Server, particularly those found in SUSE Xorg-x11-server-extra.
An attacker exploiting ZDI-CAN-16070 can escalate their privileges on the target system, potentially leading to full control.
If you are vulnerable to ZDI-CAN-16070, you should immediately apply the available security updates and monitor your system for any unauthorized access.