Vulnerability Details : CVE-2024-21885
A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
Vulnerability category: OverflowExecute code
Products affected by CVE-2024-21885
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-21885
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-21885
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Red Hat, Inc. | 2024-02-28 |
CWE ids for CVE-2024-21885
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: secalert@redhat.com (Primary)
References for CVE-2024-21885
-
https://access.redhat.com/errata/RHSA-2024:0617
RHSA-2024:0617 - Security Advisory - Red Hat カスタマーポータル
-
https://access.redhat.com/security/cve/CVE-2024-21885
CVE-2024-21885- Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0629
RHSA-2024:0629 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2995
RHSA-2024:2995 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2170
RHSA-2024:2170 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0557
RHSA-2024:0557 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2169
RHSA-2024:2169 - Security Advisory - Red Hat Customer Portal
-
https://security.netapp.com/advisory/ntap-20240503-0004/
CVE-2024-21885 X.Org X Vulnerability in NetApp Products | NetApp Product Security
-
https://bugzilla.redhat.com/show_bug.cgi?id=2256540
2256540 – (CVE-2024-21885, ZDI-CAN-22744) CVE-2024-21885 xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent
-
https://access.redhat.com/errata/RHSA-2024:0607
RHSA-2024:0607 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0597
RHSA-2024:0597 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0621
RHSA-2024:0621 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2996
RHSA-2024:2996 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0626
RHSA-2024:0626 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0614
RHSA-2024:0614 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0320
RHSA-2024:0320 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:0558
RHSA-2024:0558 - Security Advisory - Red Hat Customer Portal
Jump to