libXcursor Cursor Processing Integer Overflow Vulnerability

CVE Number – CVE-2017-16612

A vulnerability in libXcursor could allow a local attacker to execute arbitrary code or cause a denial of service (DoS) condition on a targeted system.

The vulnerability is due to an integer overflow condition that could occur when the affected software parses image files or processes malicious cursors. An attacker could exploit this vulnerability by persuading a user to open a malicious image file. An exploit could trigger a heap overflow condition that the attacker could use to execute arbitrary code or cause a DoS condition.

freedesktop.org has confirmed the vulnerability and released software patches.

Analysis
  • To exploit this vulnerability, an attacker must have local access to the targeted system or persuade a user on the system to open a malicious image file.
Safeguards
  • Administrators are advised to apply the appropriate updates.

    Administrators are advised to allow only trusted users to access local systems.

    Administrators are advised to allow only trusted users to have network access.

    Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.

    Administrators are advised to monitor affected systems.

Vendor Announcements
  • freedesktop.org has released a bug report at the following link: Bug 103961





Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: