CVE-2014-8103
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
10/12/2014
Last modified:
12/04/2025
Description
X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:x.org:xorg-server:1.15.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.15.0.901:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.15.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.15.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.15.99.901:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.15.99.902:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.15.99.903:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.15.99.904:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.16.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.16.0.901:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.16.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.16.1.901:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.16.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.16.2.99.901:*:*:*:*:*:*:* | ||
cpe:2.3:a:x.org:xorg-server:1.16.2.901:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/61947
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
- https://security.gentoo.org/glsa/201504-06
- http://secunia.com/advisories/61947
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
- https://security.gentoo.org/glsa/201504-06