Vulnerability Details : CVE-2017-13723
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
Vulnerability category: Overflow
Products affected by CVE-2017-13723
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-13723
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-13723
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-13723
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-13723
-
http://www.securityfocus.com/bid/101253
X.Org X Server 'xkbtext.c' Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2017/10/04/10
oss-security - Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723Mailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
[SECURITY] [DLA 1186-1] xorg-server security update
-
https://security.gentoo.org/glsa/201710-30
X.Org Server: Multiple vulnerabilities (GLSA 201710-30) — Gentoo securityThird Party Advisory
-
http://www.debian.org/security/2017/dsa-4000
Debian -- Security Information -- DSA-4000-1 xorg-serverThird Party Advisory
-
https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
xorg/xserver - X server (mirrored from https://gitlab.freedesktop.org/xorg/xserver)Third Party Advisory
-
https://lists.x.org/archives/xorg-announce/2017-October/002808.html
[ANNOUNCE] xorg-server 1.19.4Vendor Advisory
Jump to