Vulnerability Description
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| X.Org | X Server | < 1.20.9 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2021/01/15/1Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1862241Issue TrackingThird Party Advisory
- https://lists.x.org/archives/xorg-announce/2020-August/003058.htmlVendor Advisory
- https://security.gentoo.org/glsa/202012-01Third Party Advisory
- https://usn.ubuntu.com/4488-2/Third Party Advisory
- https://usn.ubuntu.com/4490-1/Third Party Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-20-1416/Third Party AdvisoryVDB Entry
- http://www.openwall.com/lists/oss-security/2021/01/15/1Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1862241Issue TrackingThird Party Advisory
- https://lists.x.org/archives/xorg-announce/2020-August/003058.htmlVendor Advisory
- https://security.gentoo.org/glsa/202012-01Third Party Advisory
- https://usn.ubuntu.com/4488-2/Third Party Advisory
- https://usn.ubuntu.com/4490-1/Third Party Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-20-1416/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2020-14345?
CVE-2020-14345 is a vulnerability with a CVSS score of 7.8 (HIGH). A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerabi...
How severe is CVE-2020-14345?
CVE-2020-14345 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-14345?
Check the references section above for vendor advisories and patch information. Affected products include: X.Org X Server, Canonical Ubuntu Linux.