中危 X.Org Server 释放后重用漏洞(CVE-2023-1393)
CVE编号
CVE-2023-1393利用情况
暂无补丁情况
官方补丁披露时间
2023-03-29漏洞描述
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | x.org | xorg-server | 21.1.8 | - | |||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | tigervnc | * | Up to (excluding) 1.20.4-23.1.al7 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_7 | xorg-x11-server-source | * | Up to (excluding) 1.20.4-23 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | tigervnc | * | Up to (excluding) 1.12.0-9 | |||||
运行在以下环境 | |||||||||
系统 | centos_7 | tigervnc-server | * | Up to (excluding) 1.8.0-25.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | tigervnc | * | Up to (excluding) 1.12.0-9.el8_7.3 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | xorg-server | * | Up to (excluding) 2:1.20.4-1+deb10u9 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | xorg-server | * | Up to (excluding) 2:1.20.11-1+deb11u6 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | xorg-server | * | Up to (excluding) 2:21.1.7-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | xorg-server | * | Up to (excluding) 2:21.1.7-2 | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 37 | - | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 38 | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_36 | xorg-x11-server-Xwayland-devel | * | Up to (excluding) 1.20.14-21.fc36 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | xorg-x11-server-Xwayland-devel | * | Up to (excluding) 1.20.14-21.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | xorg-x11-server-Xwayland-devel | * | Up to (excluding) 1.20.14-21.fc38 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | xorg-x11-server-Xdmx | * | Up to (excluding) 1.20.4-23.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | xorg-x11-server-Xdmx | * | Up to (excluding) 1.20.4-23.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | xwayland | * | Up to (excluding) 1.20.3-150400.38.22.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | oraclelinux-release | * | Up to (excluding) 1.8.0-25.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 1.12.0-9.el8_7.3 | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 1.12.0-5.el9_1.2 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | tigervnc-server | * | Up to (excluding) 1.8.0-25.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | tigervnc | * | Up to (excluding) 1.12.0-9.el8_7.3 | |||||
运行在以下环境 | |||||||||
系统 | redhat_9 | tigervnc-icons | * | Up to (excluding) 1.12.0-5.el9_1.2 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | xorg-x11-server-extra | * | Up to (excluding) 1.19.6-10.49.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | xorg-server-hwe-18.04 | * | Up to (excluding) 2:1.20.8-2ubuntu2.2~18.04.11 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | xorg-server | * | Up to (excluding) 2:1.20.13-1ubuntu1~20.04.8 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_22.04 | xwayland | * | Up to (excluding) 2:21.1.3-2ubuntu2.9 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_22.10 | xwayland | * | Up to (excluding) 2:22.1.3-2ubuntu0.4 | |||||
运行在以下环境 | |||||||||
系统 | unionos_a | tigervnc | * | Up to (excluding) tigervnc-1.12.0-9.uelc20.3 | |||||
运行在以下环境 | |||||||||
系统 | unionos_d | xorg-server | * | Up to (excluding) 2:1.20.4.61-1+dde | |||||
运行在以下环境 | |||||||||
系统 | unionos_e | xorg-x11-server | * | Up to (excluding) xorg-x11-server-1.20.8-18.up4.uel20 | |||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 越权影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-416 | 释放后使用 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论