Bug 815870 - (CVE-2013-1940) VUL-1: xorg-x11-server: CVE-2013-1940: Information disclosure due enabling events from hot-plug devices despite input from the device being momentarily disabled
(CVE-2013-1940)
VUL-1: xorg-x11-server: CVE-2013-1940: Information disclosure due enabling ev...
Status: RESOLVED DUPLICATE of bug 814653
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: Stefan Dirsch
Security Team bot
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2013-04-18 08:17 UTC by Alexander Bergmann
Modified: 2016-04-28 06:32 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2013-04-18 08:17:17 UTC
Public via oss-security:

Date: Thu, 18 Apr 2013 10:31:33 +0530
From: Huzaifa Sidhpurwala <huzaifas@redhat.com>
Subject: [oss-security] Xorg-x11-server: Information disclosure due enabling events from hot-plug devices despite input from the device being momentarily disabled

David Airlie and Peter Hutterer of Red Hat found an information
disclosure flaw was found in the way X.org X11 server used to register
new hot-plug devices, when X.org X11 server was instructed (for that
particular moment) not to receive input devices events. Formerly when
registering new input device, X.org X11 server simultaneously enabled
retrieval of input from the particular device (regardless of the
setting).
A local unsuspecting user, relying on the X.org X11 server disable
input feature it to properly prohibit acquiring of events from this
newly added hot-plug device, could supply a sensitive information that,
due the above bug, would become available to the physically proximate
attackers.

Upstream patch:
http://cgit.freedesktop.org/xorg/xserver/commit/?id=6ca03b9161d33b1d2b55a3a1a913cf88deb2343f

Red Hat Bugzilla:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1940

This issue has been assigned CVE-2013-1940
Comment 1 Alexander Bergmann 2013-04-18 08:19:24 UTC
From Huzaifa S. Sidhpurwala:
https://bugzilla.redhat.com/show_bug.cgi?id=950438#c12
-----------
This issue has been classified as low impact because of the following reason(s):

In order to exploit this issue, the attacker needs to

- have an account on the target machine, or otherwise be able to start an app listening for key events.
- have physical access to the machine to hotplug the keyboard or some other device.
- be logged in at the time, but vt-switch away without the screen lock being activated.
- In order to capture passwords etc, the other-use needs to have a short enough password or the other user doesn't do anything else, otherwise the events will overrun the buffer and you only get a fraction of them
-----------
Comment 2 Alexander Bergmann 2013-04-18 09:18:26 UTC
Bug was already opened. See bug#814653.

*** This bug has been marked as a duplicate of bug 814653 ***