Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6377: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION

0
High
VulnerabilityCVE-2023-6377cvecve-2023-6377
Published: Wed Dec 13 2023 (12/13/2023, 06:27:40 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION

Description

A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.

AI-Powered Analysis

AILast updated: 11/20/2025, 07:30:42 UTC

Technical Analysis

CVE-2023-6377 is a vulnerability identified in the xorg-server component of Red Hat Enterprise Linux 6 Extended Lifecycle Support. The flaw arises from improper handling of X Keyboard Extension (XKB) button actions, specifically when querying or changing input device configurations, such as switching from a touchpad to a mouse. This leads to out-of-bounds memory reads and writes, which can corrupt memory and potentially allow an attacker to escalate privileges locally. In environments where X11 forwarding is enabled—commonly used to run graphical applications remotely—this vulnerability could be exploited remotely to execute arbitrary code. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity, with attack vector local, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the flaw presents a significant risk due to the potential for privilege escalation and remote code execution. The vulnerability affects legacy systems still running RHEL 6 Extended Lifecycle Support, which are often found in environments requiring long-term stability and legacy application support. The technical root cause is an out-of-bounds memory access triggered by XKB button action queries or changes, which can be manipulated by an attacker with local access or via X11 forwarding. This vulnerability underscores the risks associated with legacy software and the importance of maintaining updated systems or applying backported patches.

Potential Impact

For European organizations, the impact of CVE-2023-6377 is significant, particularly for those relying on legacy Red Hat Enterprise Linux 6 Extended Lifecycle Support systems with graphical interfaces and X11 forwarding enabled. Successful exploitation can lead to local privilege escalation, allowing attackers to gain root-level access from a lower-privileged account, thereby compromising system integrity and confidentiality. In cases where X11 forwarding is used, remote code execution becomes possible, increasing the attack surface and risk of lateral movement within networks. This can affect critical infrastructure, government agencies, financial institutions, and enterprises that maintain legacy systems for operational continuity. The compromise of such systems could lead to data breaches, service disruptions, and unauthorized control over critical assets. Given the high CVSS score and the potential for full system compromise, organizations face risks to availability, confidentiality, and integrity of their systems and data.

Mitigation Recommendations

Organizations should prioritize applying any available patches or updates from Red Hat addressing this vulnerability as soon as they are released. Until patches are available, it is advisable to disable or restrict X11 forwarding, especially for untrusted users or networks, to reduce the risk of remote exploitation. Limiting user privileges and enforcing the principle of least privilege can mitigate the impact of local exploitation. Monitoring and logging of X11 sessions and input device changes can help detect suspicious activities. Additionally, organizations should consider migrating from RHEL 6 Extended Lifecycle Support to more current, supported versions of Red Hat Enterprise Linux to benefit from ongoing security updates. Network segmentation and strict access controls around legacy systems can further reduce exposure. Employing application whitelisting and endpoint detection and response (EDR) solutions can help detect and prevent exploitation attempts. Finally, educating system administrators about the risks of legacy software and the importance of timely patching is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-11-29T07:38:35.722Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ebfd29f5a9374a9cb424b

Added to database: 11/20/2025, 7:14:26 AM

Last enriched: 11/20/2025, 7:30:42 AM

Last updated: 12/3/2025, 2:44:08 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats