CVE-2017-2624

Published Jul 27, 2018

Last updated 5 years ago

Overview

Description
It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
Source
secalert@redhat.com
NVD status
Modified

Risk scores

CVSS 3.0

Type
Primary
Base score
7
Impact score
5.9
Exploitability score
1
Vector string
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
1.9
Impact score
2.9
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
CWE-200
secalert@redhat.com
CWE-385

Social media

Hype score
Not currently trending

Configurations