CVE-2022-46340
CVSS V2 None
CVSS V3 None
Description
A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
Overview
- CVE ID
- CVE-2022-46340
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-14T21:15:13
- Last Modified Date
- 2023-03-01T01:51:26
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:x:x.org_x11:1.20.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | 1 | OR |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-46340 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-14 22:14:54 | Added to TrackCVE | |||
2022-12-18 09:30:11 | 2022-12-14T21:15:13.110 | 2022-12-14T21:15:13 | CVE Published Date | updated |
2022-12-18 09:30:11 | 2022-12-16T05:15:17 | CVE Modified Date | updated | |
2022-12-18 09:30:11 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2022-12-18 09:30:18 | References | updated | ||
2022-12-19 03:15:35 | 2022-12-19T03:15:10 | CVE Modified Date | updated | |
2022-12-19 03:15:36 | References | updated | ||
2022-12-19 18:16:37 | 2022-12-19T17:48:37 | CVE Modified Date | updated | |
2022-12-19 18:16:37 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2022-12-19 18:16:37 | CWE-787 | Weakness Enumeration | new | |
2022-12-19 18:16:39 | CPE Information | updated | ||
2022-12-19 21:14:57 | Analyzed | Undergoing Analysis | Vulnerability Status | updated |
2022-12-21 07:02:27 | 2022-12-21T04:15:10 | CVE Modified Date | updated | |
2022-12-21 07:02:27 | Undergoing Analysis | Modified | Vulnerability Status | updated |
2022-12-21 07:02:27 | References | updated | ||
2022-12-22 20:15:30 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2022-12-26 04:16:11 | 2022-12-26T04:15:10 | CVE Modified Date | updated | |
2022-12-26 04:16:12 | References | updated | ||
2022-12-27 01:15:31 | 2022-12-27T01:15:10 | CVE Modified Date | updated | |
2023-02-02 22:14:54 | 2023-02-02T21:22:40 | CVE Modified Date | updated | |
2023-02-02 22:14:54 | A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order. | A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order. | Description | updated |
2023-02-02 22:14:55 | References | updated | ||
2023-02-12 22:19:17 | 2023-02-12T22:15:30 | CVE Modified Date | updated | |
2023-02-12 22:19:18 | A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order. | A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order. | Description | updated |
2023-03-01 02:13:14 | 2023-03-01T01:51:26 | CVE Modified Date | updated | |
2023-03-01 02:13:14 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |