X.Org Command Line Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges and Delete Arbitrary Files
|
SecurityTracker Alert ID: 1041948 |
SecurityTracker URL: http://securitytracker.com/id/1041948
|
CVE Reference:
CVE-2018-14665
(Links to External Site)
|
Date: Oct 25 2018
|
Impact:
Denial of service via local system, Root access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 1.19 and later
|
Description:
A vulnerability was reported in X.Org. A remote authenticated user can gain elevated privileges and delete arbitrary files.
A remote authenticated user can exploit a command line validation flaw to specify a '-modulepath' argument with an insecure path to cause arbitrary code to be executed on the target system.
A remote authenticated user can also exploit a command line validation flaw in the '-logfile' argument to cause arbitrary files to be deleted on the target system.
These can be exploited on systems that have the X.org X server running with elevated privileges and started by a non-root users.
Narendra Shinde reported this vulnerability.
|
Impact:
A remote authenticated user can gain elevated privileges and delete arbitrary files on the target system.
|
Solution:
The vendor has issued a fix.
The vendor advisory is available at:
https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e
|
Vendor URL: gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e (Links to External Site)
|
Cause:
Input validation error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|