Vulnerability Details : CVE-2023-6816
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
Products affected by CVE-2023-6816
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*
- cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6816
1.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6816
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-01-26 |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Red Hat, Inc. | 2024-01-18 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Red Hat, Inc. | 2024-01-29 |
CWE ids for CVE-2023-6816
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: secalert@redhat.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2023-6816
-
https://access.redhat.com/errata/RHSA-2024:0617
RHSA-2024:0617 - Security Advisory - Red Hat カスタマーポータル
-
https://security.netapp.com/advisory/ntap-20240307-0006/
January 2024 X.Org X Server 21.1.11 Vulnerabilities in NetApp Products | NetApp Product Security
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
[SECURITY] Fedora 39 Update: tigervnc-1.13.1-11.fc39 - package-announce - Fedora Mailing-ListsMailing List
-
http://www.openwall.com/lists/oss-security/2024/01/18/1
oss-security - Fwd: X.Org Security Advisory: Issues in X.Org X server prior to 21.1.11 and Xwayland prior to 23.2.4Mailing List;Patch
-
https://access.redhat.com/security/cve/CVE-2023-6816
CVE-2023-6816- Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:0629
RHSA-2024:0629 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
[SECURITY] Fedora 38 Update: xorg-x11-server-Xwayland-22.1.9-5.fc38 - package-announce - Fedora Mailing-Lists
-
https://security.gentoo.org/glsa/202401-30
X.Org X Server, XWayland: Multiple Vulnerabilities (GLSA 202401-30) — Gentoo security
-
https://access.redhat.com/errata/RHSA-2024:2170
RHSA-2024:2170 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0557
RHSA-2024:0557 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2169
RHSA-2024:2169 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=2257691
2257691 – (CVE-2023-6816) CVE-2023-6816 xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointerIssue Tracking
-
https://access.redhat.com/errata/RHSA-2024:0607
RHSA-2024:0607 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0597
RHSA-2024:0597 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0621
RHSA-2024:0621 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2996
RHSA-2024:2996 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
[SECURITY] Fedora 39 Update: xorg-x11-server-Xwayland-23.2.4-1.fc39 - package-announce - Fedora Mailing-ListsMailing List
-
https://access.redhat.com/errata/RHSA-2024:0626
RHSA-2024:0626 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0614
RHSA-2024:0614 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0320
RHSA-2024:0320 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
[SECURITY] [DLA 3721-1] xorg-server security updateMailing List
-
https://access.redhat.com/errata/RHSA-2024:0558
RHSA-2024:0558 - Security Advisory - Red Hat Customer Portal
Jump to