| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.6 | $0-$5k | 0.00 |
Summary
A vulnerability categorized as problematic has been discovered in X.Org libXi up to 1.7.1. Affected is the function XGetDeviceControl/XGetFeedbackControl/XGetDeviceDontPropagateList/XGetDeviceMotionEvents/XIGetProperty/XIGetSelectedEvents/XGetDeviceProperties/XListInputDevices of the component Graphical Library. The manipulation results in numeric error.
This vulnerability was named CVE-2013-1984. In addition, an exploit is available.
It is advisable to upgrade the affected component.
Details
A vulnerability was found in X.Org libXi up to 1.7.1. It has been classified as critical. Affected is the function XGetDeviceControl/XGetFeedbackControl/XGetDeviceDontPropagateList/XGetDeviceMotionEvents/XIGetProperty/XIGetSelectedEvents/XGetDeviceProperties/XListInputDevices of the component Graphical Library. The manipulation with an unknown input leads to a numeric error vulnerability. CWE is classifying the issue as CWE-189. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
The weakness was presented 05/23/2013 by Ilja van Sprundel with IOActive as not defined advisory (Website). The advisory is available at x.org. The public release was coordinated in cooperation with the vendor. This vulnerability is traded as CVE-2013-1984 since 02/19/2013. The exploitability is told to be difficult. It is possible to launch the attack remotely. The successful exploitation needs a authentication. Technical details and a private exploit are known.
The vulnerability scanner Nessus provides a plugin with the ID 67106 (SuSE 11.2 Security Update : xorg-x11-libs (SAT Patch Number 7846)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family SuSE Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 167200 (SUSE Enterprise Linux Security Update for xorg-x11-libs (SUSE-SU-2014:0881-1)).
Upgrading to version 1.7.2 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at cgit.freedesktop.org. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (84500), Tenable (67106), SecurityFocus (BID 60123†), OSVDB (93675†) and Secunia (SA53510†). See VDB-8875, VDB-8876, VDB-8877 and VDB-8878 for similar entries. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.x.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.9VulDB Meta Temp Score: 8.6
VulDB Base Score: 9.9
VulDB Temp Score: 8.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Private
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 67106
Nessus Name: SuSE 11.2 Security Update : xorg-x11-libs (SAT Patch Number 7846)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 892683
OpenVAS Name: Debian Security Advisory DSA 2683-1 (libxi - several vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: libXi 1.7.2
Patch: cgit.freedesktop.org
Timeline
02/19/2013 🔍05/23/2013 🔍
05/23/2013 🔍
05/23/2013 🔍
05/23/2013 🔍
05/24/2013 🔍
05/27/2013 🔍
06/10/2013 🔍
06/15/2013 🔍
06/29/2013 🔍
05/14/2021 🔍
Sources
Vendor: x.orgAdvisory: x.org
Researcher: Ilja van Sprundel
Organization: IOActive
Status: Not defined
Confirmation: 🔍
Coordinated: 🔍
CVE: CVE-2013-1984 (🔍)
GCVE (CVE): GCVE-0-2013-1984
GCVE (VulDB): GCVE-100-8898
OVAL: 🔍
X-Force: 84500
SecurityFocus: 60123 - X.Org libXi CVE-2013-1984 Multiple Remote Code Execution Vulnerabilities
Secunia: 53510 - Debian update for libxi, Less Critical
OSVDB: 93675
Vulnerability Center: 39925 - libXi Through 1.7.1 Remote Code Execution due to Integer Overflow in Multiple Functions (CVE-2013-1984), Medium
See also: 🔍
Entry
Created: 05/27/2013 17:54Updated: 05/14/2021 08:31
Changes: 05/27/2013 17:54 (85), 05/02/2017 08:31 (4), 05/14/2021 08:31 (3)
Complete: 🔍
Committer:
Cache ID: 216:2DD:103

No comments yet. Languages: en.
Please log in to comment.