CVE-2023-5367: Out-of-bounds Write in Red Hat Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
AI Analysis
Technical Summary
CVE-2023-5367 is an out-of-bounds write vulnerability identified in the xorg-x11-server component of Red Hat Enterprise Linux 6 Extended Lifecycle Support. The flaw is due to incorrect calculation of buffer offsets when copying heap-stored data within the XIChangeDeviceProperty function in Xi/xiproperty.c and the RRChangeOutputProperty function in randr/rrproperty.c. These functions handle changes to device and output properties in the X server, a critical component managing graphical display and input devices. The incorrect offset calculation can lead to writing outside the allocated buffer boundaries, potentially corrupting memory. This memory corruption can be exploited by a local attacker with low privileges to escalate their privileges or cause a denial of service by crashing the X server. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No known public exploits have been reported yet, but the vulnerability poses a significant risk in environments where attackers can gain local access, such as multi-user systems or systems exposed to untrusted users. The affected product is Red Hat Enterprise Linux 6 Extended Lifecycle Support, which is an older but still supported version for certain customers requiring extended maintenance. The lack of patch links suggests that fixes may be pending or available through Red Hat’s extended support channels.
Potential Impact
For European organizations, this vulnerability poses a significant threat especially in sectors relying on legacy Red Hat Enterprise Linux 6 Extended Lifecycle Support systems, such as government, finance, manufacturing, and critical infrastructure. Exploitation could allow attackers with limited local access to escalate privileges, potentially gaining administrative control over affected systems. This could lead to unauthorized access to sensitive data, disruption of services, or further lateral movement within networks. The denial of service impact could disrupt critical operations relying on graphical interfaces or services dependent on the X server. Given the high confidentiality, integrity, and availability impacts, organizations with legacy RHEL 6 deployments must consider this vulnerability a priority. The threat is amplified in environments where multiple users have local access or where attackers can gain footholds through other means such as compromised credentials or insider threats.
Mitigation Recommendations
1. Apply official patches from Red Hat as soon as they become available through Extended Lifecycle Support channels. 2. Restrict local access to systems running RHEL 6 Extended Lifecycle Support, limiting user accounts and enforcing strict access controls. 3. Monitor logs and system behavior for unusual activity related to X server property changes or crashes. 4. Consider isolating legacy systems from critical network segments to reduce risk of lateral movement. 5. Where patching is delayed, implement compensating controls such as disabling unnecessary X server features or restricting access to X server sockets. 6. Conduct regular security audits and vulnerability scans focusing on legacy systems. 7. Plan for migration to supported, updated operating system versions to reduce exposure to legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain
CVE-2023-5367: Out-of-bounds Write in Red Hat Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION
Description
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2023-5367 is an out-of-bounds write vulnerability identified in the xorg-x11-server component of Red Hat Enterprise Linux 6 Extended Lifecycle Support. The flaw is due to incorrect calculation of buffer offsets when copying heap-stored data within the XIChangeDeviceProperty function in Xi/xiproperty.c and the RRChangeOutputProperty function in randr/rrproperty.c. These functions handle changes to device and output properties in the X server, a critical component managing graphical display and input devices. The incorrect offset calculation can lead to writing outside the allocated buffer boundaries, potentially corrupting memory. This memory corruption can be exploited by a local attacker with low privileges to escalate their privileges or cause a denial of service by crashing the X server. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No known public exploits have been reported yet, but the vulnerability poses a significant risk in environments where attackers can gain local access, such as multi-user systems or systems exposed to untrusted users. The affected product is Red Hat Enterprise Linux 6 Extended Lifecycle Support, which is an older but still supported version for certain customers requiring extended maintenance. The lack of patch links suggests that fixes may be pending or available through Red Hat’s extended support channels.
Potential Impact
For European organizations, this vulnerability poses a significant threat especially in sectors relying on legacy Red Hat Enterprise Linux 6 Extended Lifecycle Support systems, such as government, finance, manufacturing, and critical infrastructure. Exploitation could allow attackers with limited local access to escalate privileges, potentially gaining administrative control over affected systems. This could lead to unauthorized access to sensitive data, disruption of services, or further lateral movement within networks. The denial of service impact could disrupt critical operations relying on graphical interfaces or services dependent on the X server. Given the high confidentiality, integrity, and availability impacts, organizations with legacy RHEL 6 deployments must consider this vulnerability a priority. The threat is amplified in environments where multiple users have local access or where attackers can gain footholds through other means such as compromised credentials or insider threats.
Mitigation Recommendations
1. Apply official patches from Red Hat as soon as they become available through Extended Lifecycle Support channels. 2. Restrict local access to systems running RHEL 6 Extended Lifecycle Support, limiting user accounts and enforcing strict access controls. 3. Monitor logs and system behavior for unusual activity related to X server property changes or crashes. 4. Consider isolating legacy systems from critical network segments to reduce risk of lateral movement. 5. Where patching is delayed, implement compensating controls such as disabling unnecessary X server features or restricting access to X server sockets. 6. Conduct regular security audits and vulnerability scans focusing on legacy systems. 7. Plan for migration to supported, updated operating system versions to reduce exposure to legacy vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2023-10-03T19:20:29.874Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a5558a730e5a3d9d7c22d
Added to database: 11/4/2025, 7:34:48 PM
Last enriched: 11/11/2025, 8:03:50 PM
Last updated: 12/19/2025, 8:41:20 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67712: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Web AppBuilder {Developer Edition)
MediumCVE-2025-14968: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-12874: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Quest Coexistence Manager for Notes
MediumCVE-2025-14967: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14966: SQL Injection in FastAdmin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.