Unknown
CVE-2024-31080
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A heap-based buffer over-read vulnerability was found in the X.org server’s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker’s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- Red Hat
Products
- Red Hat Enterprise Linux 7,
- Red Hat Enterprise Linux 8,
- Red Hat Enterprise Linux 8.2 Advanced Update Support,
- Red Hat Enterprise Linux 8.2 Telecommunications Update Service,
- Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions,
- Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,
- Red Hat Enterprise Linux 8.4 Telecommunications Update Service,
- Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions,
- Red Hat Enterprise Linux 8.6 Extended Update Support,
- Red Hat Enterprise Linux 8.8 Extended Update Support,
- Red Hat Enterprise Linux 9,
- Red Hat Enterprise Linux 9.0 Extended Update Support,
- Red Hat Enterprise Linux 9.2 Extended Update Support,
- Red Hat Enterprise Linux 6
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: