CVE-2017-2624

NameCVE-2017-2624
DescriptionIt was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1186-1
NVD severitylow (attack range: local)
Debian Bugs856398

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xorg-server (PTS)jessie (security), jessie2:1.16.4-1+deb8u2fixed
stretch2:1.19.2-1+deb9u5fixed
stretch (security)2:1.19.2-1+deb9u4fixed
buster2:1.20.3-1fixed
sid2:1.20.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xorg-serversource(unstable)2:1.19.2-1low856398
xorg-serversourcejessie2:1.16.4-1+deb8u2low
xorg-serversourcewheezy2:1.12.4-6+deb7u8lowDLA-1186-1

Notes

https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/

Search for package or bug name: Reporting problems