HomeX.OrgCVE-2022-46340

CVE-2022-46340

HIGH
8.8CVSS
Published: 2022-12-14
Updated: 2025-04-22
AI Analysis

Description

A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-787CWE-787

Metadata

Primary Vendor
X.ORG
Published
12/14/2022
Last Modified
4/22/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

x.org : x_serverfedoraproject : fedorafedoraproject : fedoradebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2022-46340 | HIGH Severity | CVEDatabase.com | CVEDatabase.com