Vulnerability CVE-2017-2624


Published: 2018-07-27

Description:
It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.9/10
2.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
X.org -> Xorg-server 
Debian -> Debian linux 

 References:
http://www.securityfocus.com/bid/96480
http://www.securitytracker.com/id/1037919
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
https://security.gentoo.org/glsa/201704-03
https://security.gentoo.org/glsa/201710-30
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/

Copyright 2024, cxsecurity.com

 

Back to Top