Unknown
CVE-2023-0494
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-0494
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- fedoraproject,
- redhat,
- x.org
Products
- enterprise linux 8.0,
- enterprise linux 8.1,
- enterprise linux 9.0,
- enterprise linux aus 8.4,
- enterprise linux aus 8.6,
- enterprise linux desktop 7.0,
- enterprise linux eus 8.4,
- enterprise linux eus 8.6,
- enterprise linux eus 9.0,
- enterprise linux for ibm z systems 7.0,
- enterprise linux for ibm z systems 8.0,
- enterprise linux for ibm z systems eus 8.4,
- enterprise linux for ibm z systems eus 8.6,
- enterprise linux for power big endian 7.0,
- enterprise linux for power little endian 7.0,
- enterprise linux for power little endian 8.0,
- enterprise linux for power little endian 9.0,
- enterprise linux for power little endian eus 8.4,
- enterprise linux for power little endian eus 8.6,
- enterprise linux for scientific computing 7.0,
- enterprise linux server 7.0,
- enterprise linux server aus 8.2,
- enterprise linux server for power little endian update services for sap solutions 8.1,
- enterprise linux server for power little endian update services for sap solutions 8.2,
- enterprise linux server for power little endian update services for sap solutions 8.4,
- enterprise linux server for power little endian update services for sap solutions 8.6,
- enterprise linux server for power little endian update services for sap solutions 9.0,
- enterprise linux server tus 8.2,
- enterprise linux server tus 8.4,
- enterprise linux server tus 8.6,
- enterprise linux server update services for sap solutions 8.2,
- enterprise linux server workstation 7.0,
- fedora 36,
- fedora 37,
- x server
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: