UBUNTU-CVE-2017-2624

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2017-2624
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2624.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-2624
Related
Published
2017-03-01T00:00:00Z
Modified
2017-03-01T00:00:00Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.

References

Affected packages

Ubuntu:14.04:LTS / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.9?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.15.1-0ubuntu2.9

Affected versions

2:1.*

2:1.14.3-3ubuntu2
2:1.14.3-3ubuntu3
2:1.14.3-3ubuntu4
2:1.14.3-5ubuntu1
2:1.14.4-1ubuntu1
2:1.14.4-1ubuntu2
2:1.14.4.901-0ubuntu2
2:1.14.5-1ubuntu2
2:1.14.5-1ubuntu4
2:1.15.0-1ubuntu1
2:1.15.0-1ubuntu2
2:1.15.0-1ubuntu3
2:1.15.0-1ubuntu4
2:1.15.0-1ubuntu6
2:1.15.0-1ubuntu7
2:1.15.1-0ubuntu1
2:1.15.1-0ubuntu2
2:1.15.1-0ubuntu2.1
2:1.15.1-0ubuntu2.4
2:1.15.1-0ubuntu2.5
2:1.15.1-0ubuntu2.6
2:1.15.1-0ubuntu2.7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "negligible",
    "binaries": [
        {
            "xvfb": "2:1.15.1-0ubuntu2.9",
            "xdmx": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-core-dbg": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-core-udeb-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xdmx-tools-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-dev": "2:1.15.1-0ubuntu2.9",
            "xorg-server-source": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-core": "2:1.15.1-0ubuntu2.9",
            "xserver-common": "2:1.15.1-0ubuntu2.9",
            "xnest-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xnest": "2:1.15.1-0ubuntu2.9",
            "xserver-xephyr": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-xmir": "2:1.15.1-0ubuntu2.9",
            "xdmx-tools": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-dev-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-core-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xserver-xephyr-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xdmx-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xvfb-dbgsym": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-core-udeb": "2:1.15.1-0ubuntu2.9",
            "xserver-xorg-xmir-dbgsym": "2:1.15.1-0ubuntu2.9"
        }
    ]
}

Ubuntu:14.04:LTS / xorg-server-lts-xenial

Package

Name
xorg-server-lts-xenial
Purl
pkg:deb/ubuntu/xorg-server-lts-xenial@2:1.18.3-1ubuntu2.3~trusty2?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.18.3-1ubuntu2.3~trusty2

Affected versions

2:1.*

2:1.18.3-1ubuntu2.2~trusty1
2:1.18.3-1ubuntu2.2~trusty2
2:1.18.3-1ubuntu2.2~trusty3
2:1.18.3-1ubuntu2.3~trusty1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "negligible",
    "binaries": [
        {
            "xserver-xorg-core-lts-xenial": "2:1.18.3-1ubuntu2.3~trusty2",
            "xserver-xorg-core-lts-xenial-dbg": "2:1.18.3-1ubuntu2.3~trusty2",
            "xserver-xorg-core-lts-xenial-dbgsym": "2:1.18.3-1ubuntu2.3~trusty2",
            "xorg-server-source-lts-xenial": "2:1.18.3-1ubuntu2.3~trusty2",
            "xserver-xorg-dev-lts-xenial": "2:1.18.3-1ubuntu2.3~trusty2",
            "xwayland-lts-xenial": "2:1.18.3-1ubuntu2.3~trusty2",
            "xwayland-lts-xenial-dbgsym": "2:1.18.3-1ubuntu2.3~trusty2",
            "xserver-xephyr-lts-xenial-dbgsym": "2:1.18.3-1ubuntu2.3~trusty2",
            "xserver-xephyr-lts-xenial": "2:1.18.3-1ubuntu2.3~trusty2"
        }
    ]
}

Ubuntu:16.04:LTS / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/ubuntu/xorg-server@2:1.18.4-0ubuntu0.3?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.18.4-0ubuntu0.3

Affected versions

2:1.*

2:1.17.2-1ubuntu9
2:1.17.2-1ubuntu10
2:1.17.3-2ubuntu1
2:1.17.3-2ubuntu2
2:1.17.3-2ubuntu3
2:1.17.3-2ubuntu4
2:1.18.1-1ubuntu3
2:1.18.1-1ubuntu4
2:1.18.3-1ubuntu1
2:1.18.3-1ubuntu2
2:1.18.3-1ubuntu2.2
2:1.18.3-1ubuntu2.3
2:1.18.4-0ubuntu0.1
2:1.18.4-0ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "negligible",
    "binaries": [
        {
            "xvfb": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-legacy": "2:1.18.4-0ubuntu0.3",
            "xdmx": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-core-dbg": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-core-udeb-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xdmx-tools-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-dev": "2:1.18.4-0ubuntu0.3",
            "xnest-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-core": "2:1.18.4-0ubuntu0.3",
            "xserver-common": "2:1.18.4-0ubuntu0.3",
            "xwayland-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xnest": "2:1.18.4-0ubuntu0.3",
            "xserver-xephyr": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-xmir": "2:1.18.4-0ubuntu0.3",
            "xdmx-tools": "2:1.18.4-0ubuntu0.3",
            "xmir-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xwayland": "2:1.18.4-0ubuntu0.3",
            "xorg-server-source": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-core-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xmir": "2:1.18.4-0ubuntu0.3",
            "xserver-xephyr-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xdmx-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xvfb-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-legacy-dbgsym": "2:1.18.4-0ubuntu0.3",
            "xserver-xorg-core-udeb": "2:1.18.4-0ubuntu0.3"
        }
    ]
}

Ubuntu:16.04:LTS / xorg-server-hwe-16.04

Package

Name
xorg-server-hwe-16.04
Purl
pkg:deb/ubuntu/xorg-server-hwe-16.04@2:1.18.4-1ubuntu6.1~16.04.2?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.18.4-1ubuntu6.1~16.04.2

Affected versions

2:1.*

2:1.18.4-1ubuntu6.1~16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "negligible",
    "binaries": [
        {
            "xserver-xorg-dev-hwe-16.04": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xorg-server-source-hwe-16.04": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xmir-hwe-16.04": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xserver-xorg-core-hwe-16.04-dbg": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xserver-xorg-legacy-hwe-16.04": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xwayland-hwe-16.04": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xserver-xephyr-hwe-16.04-dbgsym": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xserver-xorg-core-hwe-16.04-dbgsym": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xserver-xorg-core-hwe-16.04": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xserver-xorg-legacy-hwe-16.04-dbgsym": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xserver-xephyr-hwe-16.04": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xmir-hwe-16.04-dbgsym": "2:1.18.4-1ubuntu6.1~16.04.2",
            "xwayland-hwe-16.04-dbgsym": "2:1.18.4-1ubuntu6.1~16.04.2"
        }
    ]
}