
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A heap-based buffer over-read vulnerability (CVE-2024-31082) was discovered in the X.org server's ProcAppleDRICreatePixmap() function. The vulnerability was introduced in xorg-server-1.12.0 (2012) and has been fixed in xorg-server-21.1.12. This issue occurs when byte-swapped length values are used in replies, particularly when triggered by a client with a different endianness than the X server. The vulnerability is specific to the Xquartz server for MacOS systems and is not present in Xwayland, Xorg, or other X servers (X.Org Advisory).
The vulnerability exists in the ProcAppleDRICreatePixmap() function, which uses the byte-swapped length of the return data for the amount of data to return to the client when the client has a different endianness than the X server. The issue has been assigned a CVSS v3.1 Base Score of 7.3 HIGH (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H). The vulnerability is classified as CWE-126 (Buffer Over-read) (NVD).
When exploited, this vulnerability could allow an attacker to cause the X server to read heap memory values and transmit them back to the client until encountering an unmapped page, resulting in a crash. While the attacker cannot control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads (X.Org Advisory).
The vulnerability has been patched in xorg-server-21.1.12. Additionally, administrators can disable byte-swapped clients support by using the -byteswappedclients command-line option or by adding a configuration file in /etc/X11/xorg.conf.d/ with the option 'AllowByteSwappedClients' set to 'False'. A subsequent fix was released in xorg-server-21.1.13 to address a double-free issue introduced by the initial patch (OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”