Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5367: Out-of-bounds Write in Red Hat Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION

0
High
VulnerabilityCVE-2023-5367cvecve-2023-5367
Published: Wed Oct 25 2023 (10/25/2023, 19:46:58 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION

Description

A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.

AI-Powered Analysis

AILast updated: 11/11/2025, 20:03:50 UTC

Technical Analysis

CVE-2023-5367 is an out-of-bounds write vulnerability identified in the xorg-x11-server component of Red Hat Enterprise Linux 6 Extended Lifecycle Support. The flaw is due to incorrect calculation of buffer offsets when copying heap-stored data within the XIChangeDeviceProperty function in Xi/xiproperty.c and the RRChangeOutputProperty function in randr/rrproperty.c. These functions handle changes to device and output properties in the X server, a critical component managing graphical display and input devices. The incorrect offset calculation can lead to writing outside the allocated buffer boundaries, potentially corrupting memory. This memory corruption can be exploited by a local attacker with low privileges to escalate their privileges or cause a denial of service by crashing the X server. The vulnerability has a CVSS 3.1 score of 7.8, indicating high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No known public exploits have been reported yet, but the vulnerability poses a significant risk in environments where attackers can gain local access, such as multi-user systems or systems exposed to untrusted users. The affected product is Red Hat Enterprise Linux 6 Extended Lifecycle Support, which is an older but still supported version for certain customers requiring extended maintenance. The lack of patch links suggests that fixes may be pending or available through Red Hat’s extended support channels.

Potential Impact

For European organizations, this vulnerability poses a significant threat especially in sectors relying on legacy Red Hat Enterprise Linux 6 Extended Lifecycle Support systems, such as government, finance, manufacturing, and critical infrastructure. Exploitation could allow attackers with limited local access to escalate privileges, potentially gaining administrative control over affected systems. This could lead to unauthorized access to sensitive data, disruption of services, or further lateral movement within networks. The denial of service impact could disrupt critical operations relying on graphical interfaces or services dependent on the X server. Given the high confidentiality, integrity, and availability impacts, organizations with legacy RHEL 6 deployments must consider this vulnerability a priority. The threat is amplified in environments where multiple users have local access or where attackers can gain footholds through other means such as compromised credentials or insider threats.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available through Extended Lifecycle Support channels. 2. Restrict local access to systems running RHEL 6 Extended Lifecycle Support, limiting user accounts and enforcing strict access controls. 3. Monitor logs and system behavior for unusual activity related to X server property changes or crashes. 4. Consider isolating legacy systems from critical network segments to reduce risk of lateral movement. 5. Where patching is delayed, implement compensating controls such as disabling unnecessary X server features or restricting access to X server sockets. 6. Conduct regular security audits and vulnerability scans focusing on legacy systems. 7. Plan for migration to supported, updated operating system versions to reduce exposure to legacy vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-10-03T19:20:29.874Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a5558a730e5a3d9d7c22d

Added to database: 11/4/2025, 7:34:48 PM

Last enriched: 11/11/2025, 8:03:50 PM

Last updated: 12/20/2025, 5:14:01 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats