CVE-2022-46340

CVSS V2 None CVSS V3 None
Description
A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
Overview
  • CVE ID
  • CVE-2022-46340
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-12-14T21:15:13
  • Last Modified Date
  • 2023-03-01T01:51:26
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:x:x.org_x11:1.20.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* 1 OR
History
Created Old Value New Value Data Type Notes
2022-12-14 22:14:54 Added to TrackCVE
2022-12-18 09:30:11 2022-12-14T21:15:13.110 2022-12-14T21:15:13 CVE Published Date updated
2022-12-18 09:30:11 2022-12-16T05:15:17 CVE Modified Date updated
2022-12-18 09:30:11 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2022-12-18 09:30:18 References updated
2022-12-19 03:15:35 2022-12-19T03:15:10 CVE Modified Date updated
2022-12-19 03:15:36 References updated
2022-12-19 18:16:37 2022-12-19T17:48:37 CVE Modified Date updated
2022-12-19 18:16:37 Undergoing Analysis Analyzed Vulnerability Status updated
2022-12-19 18:16:37 CWE-787 Weakness Enumeration new
2022-12-19 18:16:39 CPE Information updated
2022-12-19 21:14:57 Analyzed Undergoing Analysis Vulnerability Status updated
2022-12-21 07:02:27 2022-12-21T04:15:10 CVE Modified Date updated
2022-12-21 07:02:27 Undergoing Analysis Modified Vulnerability Status updated
2022-12-21 07:02:27 References updated
2022-12-22 20:15:30 Modified Undergoing Analysis Vulnerability Status updated
2022-12-26 04:16:11 2022-12-26T04:15:10 CVE Modified Date updated
2022-12-26 04:16:12 References updated
2022-12-27 01:15:31 2022-12-27T01:15:10 CVE Modified Date updated
2023-02-02 22:14:54 2023-02-02T21:22:40 CVE Modified Date updated
2023-02-02 22:14:54 A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order. A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order. Description updated
2023-02-02 22:14:55 References updated
2023-02-12 22:19:17 2023-02-12T22:15:30 CVE Modified Date updated
2023-02-12 22:19:18 A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order. A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order. Description updated
2023-03-01 02:13:14 2023-03-01T01:51:26 CVE Modified Date updated
2023-03-01 02:13:14 Undergoing Analysis Analyzed Vulnerability Status updated