Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31080: Buffer Over-read

0
High
VulnerabilityCVE-2024-31080cvecve-2024-31080
Published: Thu Apr 04 2024 (04/04/2024, 13:47:33 UTC)
Source: CVE Database V5

Description

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:54:25 UTC

Technical Analysis

CVE-2024-31080 is a heap-based buffer over-read vulnerability identified in the X.org server, specifically within the ProcXIGetSelectedEvents() function. This function handles client requests related to input device event selection. The vulnerability manifests when the server processes replies containing length fields that have been byte-swapped due to differences in endianness between the client and server architectures. This byte-swapping leads to incorrect length interpretation, causing the server to read beyond the allocated heap buffer boundaries. As a result, the server may leak heap memory contents back to the client until it encounters an unmapped memory page, which also triggers a segmentation fault and crashes the X server. Although the attacker cannot precisely control the leaked memory content, the over-read can expose sensitive information stored in heap memory. The vulnerability requires the attacker to have local privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), and the scope remains unchanged (S:U). The CVSS v3.1 base score is 7.3, reflecting high severity due to the potential for confidentiality breach and denial of service. The affected version is X.org server 29.1.0. No patches or known exploits have been reported at the time of disclosure. This vulnerability is particularly relevant in environments where clients with different endianness architectures connect to the X server, such as mixed hardware environments or emulated systems.

Potential Impact

The primary impact of CVE-2024-31080 is twofold: confidentiality and availability. Confidentiality is impacted because the vulnerability allows an attacker to read arbitrary heap memory contents from the X server process, potentially exposing sensitive information such as cryptographic keys, passwords, or other private data residing in memory. Availability is affected due to the segmentation fault caused by the out-of-bounds read, which crashes the X server, resulting in denial of service for users relying on the graphical environment. Integrity impact is limited since the attacker cannot control the data written or modify server state directly. Organizations running X.org server 29.1.0 on systems with clients of differing endianness are at risk, particularly in heterogeneous environments or where local users have access to the system. The requirement for local privileges limits remote exploitation, but insider threats or compromised local accounts could leverage this vulnerability. The lack of known exploits reduces immediate risk, but the high CVSS score and potential for sensitive data leakage and service disruption make timely mitigation essential. The vulnerability could disrupt critical services relying on graphical interfaces, impacting productivity and operational continuity.

Mitigation Recommendations

To mitigate CVE-2024-31080, organizations should prioritize updating the X.org server to a patched version once available from trusted vendors or distributions. In the absence of an official patch, consider applying vendor-provided workarounds or configuration changes that disable or restrict the use of the ProcXIGetSelectedEvents() function or limit connections from clients with differing endianness. Restrict local user access to systems running the vulnerable X.org server to trusted personnel only, minimizing the risk of exploitation by unprivileged users. Employ strict access controls and monitoring to detect unusual local client connections or crashes of the X server process. Use memory protection mechanisms such as Address Space Layout Randomization (ASLR) and heap protection features to reduce the impact of memory corruption vulnerabilities. Additionally, consider isolating critical graphical systems in secure environments or containers to limit the blast radius of potential crashes or data leaks. Regularly audit and monitor logs for segmentation faults or abnormal X server behavior that could indicate exploitation attempts. Finally, educate system administrators and users about the risks associated with local privilege misuse and enforce least privilege principles.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-03-28T02:56:55.574Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3729f5a9374a9d10f39

Added to database: 11/20/2025, 7:29:54 AM

Last enriched: 2/28/2026, 10:54:25 AM

Last updated: 3/22/2026, 6:06:24 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses