CVE-2018-14665
Assigned by [email protected]
A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
Weaknesses (CWE)
CWE-863 — Incorrect Authorization
Chain: product does not properly check the result of a reverse DNS lookup because of operator precedence (CWE-783), allowing bypass of DNS-based access restrictions.Chain: product does not properly check the result of a reverse DNS lookup because of operator precedence (CWE-783), allowing bypass of DNS-based access restrictions.
CVSS
6.6
Base Score: 6.6/10 MEDIUM
Exploitability: 0.7/10
Impact: 5.9/10
Access Vector
- Availability: HIGH
- Confidentiality: HIGH
- Integrity: HIGH
Impact
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Attack Patterns (CAPEC)
References
http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html
http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html
http://www.securityfocus.com/bid/105741
http://www.securitytracker.com/id/1041948
https://access.redhat.com/errata/RHSA-2018:3410
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665
https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e
https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170
https://lists.x.org/archives/xorg-announce/2018-October/002927.html
https://security.gentoo.org/glsa/201810-09
https://usn.ubuntu.com/3802-1/
https://www.debian.org/security/2018/dsa-4328
https://www.exploit-db.com/exploits/45697/
https://www.exploit-db.com/exploits/45742/
https://www.exploit-db.com/exploits/45832/
https://www.exploit-db.com/exploits/45908/
https://www.exploit-db.com/exploits/45922/
https://www.exploit-db.com/exploits/45938/
https://www.exploit-db.com/exploits/46142/
https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html
http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html
http://www.securityfocus.com/bid/105741
http://www.securitytracker.com/id/1041948
https://access.redhat.com/errata/RHSA-2018:3410
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665
https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e
https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170
https://lists.x.org/archives/xorg-announce/2018-October/002927.html
https://security.gentoo.org/glsa/201810-09
https://usn.ubuntu.com/3802-1/
https://www.debian.org/security/2018/dsa-4328
https://www.exploit-db.com/exploits/45697/
https://www.exploit-db.com/exploits/45742/
https://www.exploit-db.com/exploits/45832/
https://www.exploit-db.com/exploits/45908/
https://www.exploit-db.com/exploits/45922/
https://www.exploit-db.com/exploits/45938/
https://www.exploit-db.com/exploits/46142/
https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
