A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Published 2024-04-04 14:15:11
Updated 2024-11-13 13:15:04
Source Red Hat, Inc.
View at NVD,   CVE.org

Products affected by CVE-2024-31082

Please log in to view affected product information.

Exploit prediction scoring system (EPSS) score for CVE-2024-31082

0.07%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2024-31082

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.3
HIGH CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.8
5.5
Red Hat, Inc. 2024-04-04

CWE ids for CVE-2024-31082

  • The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
    Assigned by: secalert@redhat.com (Secondary)

References for CVE-2024-31082

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!