2024-01-18 07:00:28 +00:00
{
"id" : "CVE-2023-6816" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2024-01-18T05:15:08.607" ,
2024-09-16 18:03:17 +00:00
"lastModified" : "2024-09-16T16:15:11.937" ,
2024-01-29 07:00:28 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-18 07:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used."
2024-01-18 13:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor."
2024-01-18 07:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-26 19:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
2024-01-18 07:00:28 +00:00
{
"source" : "secalert@redhat.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
2024-01-29 07:00:28 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
2024-01-18 07:00:28 +00:00
"attackComplexity" : "LOW" ,
2024-01-29 07:00:28 +00:00
"privilegesRequired" : "NONE" ,
2024-01-18 07:00:28 +00:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
2024-01-29 07:00:28 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
2024-01-18 07:00:28 +00:00
} ,
2024-01-29 07:00:28 +00:00
"exploitabilityScore" : 3.9 ,
2024-01-18 07:00:28 +00:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-01-26 19:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
} ,
2024-01-18 07:00:28 +00:00
{
"source" : "secalert@redhat.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
2024-02-04 21:00:28 +00:00
"value" : "CWE-787"
2024-01-18 07:00:28 +00:00
}
]
}
] ,
2024-01-26 19:00:29 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "21.1.11" ,
"matchCriteriaId" : "565381E7-E0BD-408F-B970-34E9724B1B08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "23.2.4" ,
"matchCriteriaId" : "1FE48099-1D7F-444E-8F0C-FAB71F25AD71"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EF4996-72F4-4FA4-814F-F5991E7A8318"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
] ,
2024-01-18 07:00:28 +00:00
"references" : [
2024-01-22 17:00:29 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0320" ,
2024-01-26 19:00:29 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2024-01-22 17:00:29 +00:00
} ,
2024-01-30 17:00:28 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0557" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0558" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0597" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0607" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0614" ,
"source" : "secalert@redhat.com"
} ,
2024-01-31 17:00:28 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0617" ,
"source" : "secalert@redhat.com"
} ,
2024-01-30 23:00:44 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0621" ,
"source" : "secalert@redhat.com"
} ,
2024-01-31 17:00:28 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0626" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0629" ,
"source" : "secalert@redhat.com"
} ,
2024-04-30 16:03:27 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2169" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2170" ,
"source" : "secalert@redhat.com"
} ,
2024-05-22 18:03:22 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2996" ,
"source" : "secalert@redhat.com"
} ,
2024-01-18 07:00:28 +00:00
{
"url" : "https://access.redhat.com/security/cve/CVE-2023-6816" ,
2024-01-26 19:00:29 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2024-01-18 07:00:28 +00:00
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" ,
2024-01-26 19:00:29 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Issue Tracking"
]
2024-01-18 07:00:28 +00:00
}
]
}