• 公告ID (KylinSec-SA-2023-1363)

摘要:

A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.

安全等级: Low

公告ID: KylinSec-SA-2023-1363

发布日期: 2023年5月27日

关联CVE: CVE-2022-46340  

  • 详细介绍

1. 漏洞描述

   

A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-46340 KY3.4-4A tigervnc Unaffected
CVE-2022-46340 KY3.4-5 tigervnc Unaffected
CVE-2022-46340 KY3.5.1 tigervnc Unaffected
CVE-2022-46340 KY3.5.2 tigervnc Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1362 下一篇:KylinSec-SA-2023-1364