{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-46343","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-04-22T15:14:18.715Z","dateReserved":"2022-11-30T00:00:00.000Z","datePublished":"2022-12-14T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-05-30T05:08:22.164Z"},"descriptions":[{"lang":"en","value":"A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions."}],"affected":[{"vendor":"n/a","product":"xorg-x11-server","versions":[{"version":"xorg-x11-server-1.20.4","status":"affected"}]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2022-46343"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151758"},{"name":"FEDORA-2022-c3a65f7c65","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"name":"FEDORA-2022-721a78b7e5","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"name":"DSA-5304","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5304"},{"name":"FEDORA-2022-dd3eb7e0a8","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"},{"url":"https://security.gentoo.org/glsa/202305-30"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"use-after-free"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:31:46.549Z"},"title":"CVE Program Container","references":[{"url":"https://access.redhat.com/security/cve/CVE-2022-46343","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151758","tags":["x_transferred"]},{"name":"FEDORA-2022-c3a65f7c65","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/"},{"name":"FEDORA-2022-721a78b7e5","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/"},{"name":"DSA-5304","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5304"},{"name":"FEDORA-2022-dd3eb7e0a8","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/"},{"url":"https://security.gentoo.org/glsa/202305-30","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-416","lang":"en","description":"CWE-416 Use After Free"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-22T15:13:50.993173Z","id":"CVE-2022-46343","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-22T15:14:18.715Z"}}]}}