Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31082: Buffer Over-read

0
High
VulnerabilityCVE-2024-31082cvecve-2024-31082
Published: Thu Apr 04 2024 (04/04/2024, 13:48:34 UTC)
Source: CVE Database V5

Description

A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:54:53 UTC

Technical Analysis

CVE-2024-31082 is a heap-based buffer over-read vulnerability identified in the X.org server, specifically within the ProcAppleDRICreatePixmap() function. The flaw occurs when the server processes replies containing byte-swapped length values, which can happen when a client with a different endianness communicates with the server. This mismatch leads the server to misinterpret length fields, causing it to read beyond the allocated heap buffer boundaries. As a result, the server may leak heap memory contents back to the client until it encounters an unmapped memory page, which then triggers a segmentation fault and crashes the X server. While the attacker cannot precisely control the data leaked, the vulnerability allows exposure of potentially sensitive heap data. The issue affects X.org server version 1.12.0 and requires low privileges to exploit, with no user interaction needed. The CVSS 3.1 score of 7.3 reflects high confidentiality impact due to memory disclosure, moderate integrity impact, and high availability impact due to crashes. No public exploits have been reported yet, but the vulnerability poses a risk of denial of service and information leakage in environments using affected X.org versions.

Potential Impact

The primary impact of CVE-2024-31082 is twofold: information disclosure and denial of service. By exploiting this vulnerability, an attacker with local access and low privileges can cause the X.org server to leak portions of its heap memory, potentially exposing sensitive information such as cryptographic keys, credentials, or other confidential data residing in memory. Additionally, the out-of-bounds read leads to segmentation faults, crashing the X server and causing denial of service to users relying on graphical sessions. This can disrupt business operations, especially in environments where X.org servers provide critical graphical interfaces or remote desktop services. Since the vulnerability requires local access, remote exploitation is less likely unless combined with other attack vectors. However, in multi-user systems or shared environments, malicious users could leverage this flaw to compromise confidentiality and availability. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.

Mitigation Recommendations

To mitigate CVE-2024-31082, organizations should first verify if they are running the affected X.org server version 1.12.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, administrators can implement the following practical measures: restrict local access to trusted users only, minimizing the risk of exploitation by unprivileged users; employ mandatory access controls (e.g., SELinux, AppArmor) to limit the X server's ability to access or leak sensitive memory regions; monitor system logs and X server crash reports for signs of exploitation attempts; consider isolating critical graphical sessions using containerization or virtualization to reduce attack surface; and disable or restrict clients with differing endianness if feasible, to prevent triggering the byte-swapped length condition. Additionally, regular memory integrity monitoring and incident response readiness can help detect and respond to exploitation attempts promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-03-28T02:56:55.575Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3729f5a9374a9d10f6d

Added to database: 11/20/2025, 7:29:54 AM

Last enriched: 2/28/2026, 10:54:53 AM

Last updated: 3/23/2026, 7:31:30 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses