EUVD-2025-18503

| CVE-2025-49176 HIGH
2025-06-17 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18503
CVE Published
Jun 17, 2025 - 15:15 nvd
HIGH 7.3

Description

A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.

Analysis

CVE-2025-49176 is an integer overflow vulnerability in the X11 Big Requests extension that allows local attackers with low privileges to bypass request size validation by triggering a multiplication-based integer wrap-around, enabling denial of service or potential code execution through oversized X protocol requests. The vulnerability affects X11 server implementations that use the Big Requests extension; while not currently listed in CISA KEV catalog, the 7.3 CVSS score and local attack vector indicate moderate-to-high real-world risk for multi-user systems. No public POC or active exploitation has been confirmed at time of analysis.

Technical Context

The Big Requests extension (part of X11/Xorg protocol stack) extends the maximum request size limit for X protocol communication beyond the standard 262,144-byte limit. The vulnerability exists in the request size validation logic, where the request length parameter is multiplied by 4 before comparison against a configured maximum size threshold—a common pattern for converting byte counts to word counts in X protocol processing. This multiplication (CWE-190: Integer Overflow or Wraparound) can cause the 32-bit integer to wrap around, resulting in a small value that passes the size check despite the original request being much larger. Affected components include Xorg server implementations and X11 protocol libraries that implement the Big Requests extension (BIGREQ extension). The root cause is improper input validation prior to arithmetic operations on untrusted client-supplied values.

Affected Products

Xorg X Server versions prior to the patch release (specific version not provided in available data; typically affects stable branches 21.1.x and earlier). X11 protocol implementations and client libraries using the Big Requests extension across Linux distributions. CPE data would typically be: cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:* (version range TBD pending vendor advisory). Affected configurations include: (1) Linux systems running Xorg with Big Requests extension enabled (enabled by default in most distributions), (2) Multi-user shared systems, containers, or cloud instances where unprivileged users can initiate X connections, (3) Thin client or terminal server environments. Specific vendor-affected distributions likely include Debian, Ubuntu, Fedora, Red Hat Enterprise Linux, openSUSE, and Arch Linux—consult respective security advisories for patched versions.

Remediation

Immediate: (1) Update Xorg X Server to the patched version (version number pending—check security advisories from Xorg, Debian, Red Hat, and Ubuntu); (2) Verify Big Requests extension is patched via 'Xvfb -version' or 'grep -i bigreq' on running X servers. Short-term mitigation: (1) Disable Big Requests extension if not required by applications (uncommon configuration), (2) Restrict local X access via xhost controls or by limiting users with X session access, (3) Use authentication mechanisms like MIT-MAGIC-COOKIE or X11 socket permissions to limit client connections. Long-term: (1) Enable SELinux or AppArmor profiles to restrict X server process capabilities, (2) Run X server in containerized/sandboxed environments with reduced privileges, (3) Apply principle of least privilege for local user accounts. Patch availability: Check Xorg security advisories, RHEL/CentOS updates via 'yum update xorg-x11-server', Debian/Ubuntu via 'apt update && apt upgrade xorg-server', and respective CVE tracker pages for each distribution.

Priority Score

37
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: 0

Vendor Status

Ubuntu

Priority: Medium
xorg-server
Release Status Version
jammy released 2:21.1.4-2ubuntu1.7~22.04.15
noble released 2:21.1.12-1ubuntu1.4
oracular released 2:21.1.13-2ubuntu1.4
plucky released 2:21.1.16-1ubuntu1.1
trusty needs-triage -
upstream released 21.1.17
bionic released 2:1.19.6-1ubuntu4.15+esm13
focal released 2:1.20.13-1ubuntu1~20.04.20+esm1
xenial released 2:1.18.4-0ubuntu0.12+esm18
questing released 2:21.1.18-1ubuntu1
xwayland
Release Status Version
jammy released 2:22.1.1-1ubuntu0.19
noble released 2:23.2.6-1ubuntu0.6
oracular released 2:24.1.2-1ubuntu0.6
plucky released 2:24.1.6-1ubuntu0.1
upstream released 24.1.7
questing released 2:24.1.6-1ubuntu1
xorg-hwe-16.04
Release Status Version
plucky DNE -
xenial not-affected code not present
jammy DNE -
noble DNE -
oracular DNE -
upstream not-affected -
questing DNE -
xorg
Release Status Version
xenial not-affected code not present
bionic not-affected code not present
focal not-affected code not present
jammy not-affected code not present
noble not-affected code not present
oracular not-affected code not present
plucky not-affected code not present
upstream not-affected -
questing not-affected code not present
xorg-server-hwe-16.04
Release Status Version
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
xenial released 2:1.19.6-1ubuntu4.1~16.04.6+esm10
questing DNE -
xorg-server-hwe-18.04
Release Status Version
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
bionic released 2:1.20.8-2ubuntu2.2~18.04.11+esm5
questing DNE -
xorg-hwe-18.04
Release Status Version
bionic not-affected code not present
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream not-affected -
questing DNE -

Debian

Bug #1108073
xorg-server
Release Status Fixed Version Urgency
bullseye fixed 2:1.20.11-1+deb11u16 -
bullseye (security) fixed 2:1.20.11-1+deb11u17 -
bookworm, bookworm (security) fixed 2:21.1.7-3+deb12u11 -
trixie (security), trixie fixed 2:21.1.16-1.3+deb13u1 -
forky, sid fixed 2:21.1.21-1 -
bookworm fixed 2:21.1.7-3+deb12u10 -
(unstable) fixed 2:21.1.16-1.3 -
xwayland
Release Status Fixed Version Urgency
bookworm vulnerable 2:22.1.9-1 -
trixie vulnerable 2:24.1.6-1 -
forky, sid fixed 2:24.1.9-1 -
(unstable) fixed 2:24.1.8-1 -

Share

EUVD-2025-18503 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy