Уязвимость CVE-2021-31535: Информация

Описание

LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.

Важность: CRITICAL (9,8) Вектор: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Опубликовано: 27 мая 2021 г.
Изменено: 7 ноября 2023 г.
Идентификатор типа ошибки: CWE-120

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
libX11sisyphus1.7.1-alt11.8.8-alt1ALT-PU-2021-1835-1272146Исправлено
libX11p101.7.1-alt11.8.7-alt1ALT-PU-2021-1835-1272146Исправлено
libX11p91.7.1-alt11.7.2-alt1ALT-PU-2021-1868-1272150Исправлено
libX11c10f11.7.1-alt11.8.7-alt1ALT-PU-2021-1835-1272146Исправлено
libX11c9f21.7.2-alt11.8.7-alt1ALT-PU-2021-2344-1276681Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
  • Exploit
  • Third Party Advisory
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
  • Exploit
  • Third Party Advisory
https://lists.freedesktop.org/archives/xorg/
  • Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/05/18/2
  • Mailing List
  • Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/05/18/3
  • Mailing List
  • Third Party Advisory
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
  • Vendor Advisory
[debian-lts-announce] 20210524 [SECURITY] [DLA 2666-1] libx11 security update
  • Third Party Advisory
http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
  • Exploit
  • Third Party Advisory
  • VDB Entry
DSA-4920
  • Third Party Advisory
[oss-security] 20210518 libX11 security advisory: May 18, 2021
  • Mailing List
  • Third Party Advisory
GLSA-202105-16
  • Third Party Advisory
20210520 CVE-2021-31535 libX11 Insufficient Length Checks PoC and Archeology
  • Mailing List
  • Third Party Advisory
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20210813-0001/
  • Third Party Advisory
FEDORA-2021-62bb9998b2
    [kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
      [kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
        [kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
          [kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
              1. Конфигурация 1

                cpe:2.3:o:x.org:x_window_system:*:*:*:*:*:*:*:*
                End including
                x11r7.7

                cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*
                End excliding
                1.7.1

                Конфигурация 2

                cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*