Bug 814126 (CVE-2012-2118)
|Summary:||CVE-2012-2118 xorg-x11-server: Input device name logging format string flaw|
|Product:||[Other] Security Response||Reporter:||Jan Lieskovsky <jlieskov>|
|Component:||vulnerability||Assignee:||Red Hat Product Security <security-response-team>|
|Status:||CLOSED NOTABUG||QA Contact:|
|Fixed In Version:||Doc Type:||Bug Fix|
|Doc Text:||Story Points:||---|
|Last Closed:||2012-06-28 11:10:50 UTC||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Cloudforms Team:||---||Target Upstream Version:|
|Bug Depends On:||814128|
Description Jan Lieskovsky 2012-04-19 09:47:13 UTC
A format string flaw was found in the way xorg-x11-server, a X.Org X11 X server, performed log message writes for certain forms of the log message to be written. If a local attacker assigned a specially-crafted name to a input device and was able to trick the system administrator in order to the local Xorg server instance to use this device, it would lead to Xorg service instance abort. Upstream patch series:  http://patchwork.freedesktop.org/patch/10000/  http://patchwork.freedesktop.org/patch/9998/  http://patchwork.freedesktop.org/patch/9999/  http://patchwork.freedesktop.org/patch/10001/ CVE request:  http://www.openwall.com/lists/oss-security/2012/04/18/8 CVE assignment:  http://www.openwall.com/lists/oss-security/2012/04/19/2 Possible way to reproduce (from ): 1. Name a Bluetooth keyboard "%n%n%n%n%n%n%n%n" 2. Pair it with a computer running X and try to use it 3. X is not happy when trying to do the following in xf86-input-evdev: xf86IDrvMsg(pInfo, X_CONFIG, "Device: "%s"\n", device); because LogVHdrMessageVerb() has put the %n from the device name into a format string.
Comment 1 Jan Lieskovsky 2012-04-19 09:49:05 UTC
This issue affects the version of the xorg-x11-server package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the version of the xorg-x11-server package, as shipped with Fedora release of 15 and 16. Please schedule an update.
Comment 2 Jan Lieskovsky 2012-04-19 09:49:53 UTC
Created xorg-x11-server tracking bugs for this issue Affects: fedora-all [bug 814128]
Comment 5 Huzaifa S. Sidhpurwala 2012-06-28 11:10:50 UTC
The version of xorg-x11-server in Red Hat Enterprise Linux 5 and 6, is protected by format string protections since its compiled with FORTIFY_SOURCE enabled. Hence the maximum impact of this flaw is limited to crash only. Further, to exploit this issue, the attacker would need physical access to the system. Statement: Red Hat does not consider crash of end user application such as xorg-x11-server caused by local user actions to be a security flaw.