CVE-2017-10971

EUVD-2017-2609
In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
x.orgx_server
𝑥
≤ 1.19.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xorg-server
bookworm
2:21.1.7-3+deb12u7
fixed
bookworm (security)
2:21.1.7-3+deb12u8
fixed
bullseye
2:1.20.11-1+deb11u13
fixed
bullseye (security)
2:1.20.11-1+deb11u14
fixed
sid
2:21.1.14-1
fixed
trixie
2:21.1.14-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xorg
trusty
dne
xenial
not-affected
yakkety
not-affected
zesty
not-affected
xorg-hwe-16.04
trusty
dne
xenial
not-affected
yakkety
dne
zesty
dne
xorg-server
trusty
Fixed 2:1.15.1-0ubuntu2.9
released
xenial
Fixed 2:1.18.4-0ubuntu0.3
released
yakkety
ignored
zesty
Fixed 2:1.19.3-1ubuntu1.1
released
xorg-server-hwe-16.04
trusty
dne
xenial
Fixed 2:1.18.4-1ubuntu6.1~16.04.2
released
yakkety
dne
zesty
dne
xorg-server-lts-utopic
trusty
dne
xenial
dne
yakkety
dne
zesty
dne
xorg-server-lts-vivid
trusty
dne
xenial
dne
yakkety
dne
zesty
dne
xorg-server-lts-wily
trusty
dne
xenial
dne
yakkety
dne
zesty
dne
xorg-server-lts-xenial
trusty
Fixed 2:1.18.3-1ubuntu2.3~trusty2
released
xenial
dne
yakkety
dne
zesty
dne