CVE Vulnerabilities

CVE-2023-43786

Uncontrolled Resource Consumption

Published: Oct 10, 2023 | Modified: Nov 04, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
Libx11X.org*1.8.7 (excluding)
Red Hat Enterprise Linux 8RedHatlibX11-0:1.6.8-8.el8*
Red Hat Enterprise Linux 9RedHatlibX11-0:1.7.0-9.el9*
Libx11Ubuntubionic*
Libx11Ubuntudevel*
Libx11Ubuntuesm-infra-legacy/trusty*
Libx11Ubuntuesm-infra/bionic*
Libx11Ubuntuesm-infra/focal*
Libx11Ubuntuesm-infra/xenial*
Libx11Ubuntufocal*
Libx11Ubuntujammy*
Libx11Ubuntulunar*
Libx11Ubuntumantic*
Libx11Ubuntunoble*
Libx11Ubuntuoracular*
Libx11Ubuntuplucky*
Libx11Ubuntuquesting*
Libx11Ubuntutrusty*
Libx11Ubuntutrusty/esm*
Libx11Ubuntuupstream*
Libx11Ubuntuxenial*
LibxpmUbuntubionic*
LibxpmUbuntudevel*
LibxpmUbuntuesm-infra-legacy/trusty*
LibxpmUbuntuesm-infra/bionic*
LibxpmUbuntuesm-infra/focal*
LibxpmUbuntuesm-infra/xenial*
LibxpmUbuntufocal*
LibxpmUbuntujammy*
LibxpmUbuntulunar*
LibxpmUbuntumantic*
LibxpmUbuntunoble*
LibxpmUbuntuoracular*
LibxpmUbuntuplucky*
LibxpmUbuntuquesting*
LibxpmUbuntutrusty*
LibxpmUbuntutrusty/esm*
LibxpmUbuntuupstream*
LibxpmUbuntuxenial*
MotifUbuntubionic*
MotifUbuntufocal*
MotifUbuntulunar*
MotifUbuntumantic*
MotifUbuntuoracular*
MotifUbuntuplucky*
MotifUbuntutrusty*
MotifUbuntutrusty/esm*
MotifUbuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References