Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-8102 | First vendor Publication | 2014-12-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28527 | |||
Oval ID: | oval:org.mitre.oval:def:28527 | ||
Title: | DSA-3095-1 -- xorg-server security update | ||
Description: | Ilja van Sprundel of IOActive discovered several security issues in the X.org X server, which may lead to privilege escalation or denial of service. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3095-1 CVE-2014-8091 CVE-2014-8092 CVE-2014-8093 CVE-2014-8094 CVE-2014-8095 CVE-2014-8096 CVE-2014-8097 CVE-2014-8098 CVE-2014-8099 CVE-2014-8100 CVE-2014-8101 CVE-2014-8102 | Version: | 4 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | xorg-server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28577 | |||
Oval ID: | oval:org.mitre.oval:def:28577 | ||
Title: | ELSA-2014-1982 -- xorg-x11-server security update (important) | ||
Description: | [1.1.1-48.107.0.1.el5_11] - Added oracle-enterprise-detect.patch - Replaced 'Red Hat' in spec file [1.1.1-48.107] - CVE-2014-8091 denial of service due to unchecked malloc in client authentication (#1168680) - CVE-2014-8092 integer overflow in X11 core protocol requests when calculating memory needs for requests (#1168684) - CVE-2014-8097 out of bounds access due to not validating length or offset values in DBE extension (#1168705) - CVE-2014-8095 out of bounds access due to not validating length or offset values in XInput extension (#1168694) - CVE-2014-8096 out of bounds access due to not validating length or offset values in XC-MISC extension(#1168700) - CVE-2014-8099 out of bounds access due to not validating length or offset values in XVideo extension (#1168710) - CVE-2014-8100 out of bounds access due to not validating length or offset values in Render extension (#1168711) - CVE-2014-8102 out of bounds access due to not validating length or offset values in XFixes extension (#1168714) - CVE-2014-8101 out of bounds access due to not validating length or offset values in RandR extension (#1168713) - CVE-2014-8093 xorg-x11-server: integer overflow in GLX extension requests when calculating memory needs for requests (#1168688) - CVE-2014-8098 xorg-x11-server: out of bounds access due to not validating length or offset values in GLX extension (#1168707) [1.1.1-48.104] - xserver-1.1.1-randr-config-timestamps.patch: Backport timestamp comparison fix from upstream RANDR code (#1006076) [1.1.1-48.103] - CVE-2013-6424: Fix OOB in trapezoid rasterization | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1982 CVE-2014-8091 CVE-2014-8092 CVE-2014-8093 CVE-2014-8095 CVE-2014-8096 CVE-2014-8097 CVE-2014-8098 CVE-2014-8099 CVE-2014-8100 CVE-2014-8101 CVE-2014-8102 | Version: | 3 |
Platform(s): | Oracle Linux 5 | Product(s): | xorg-x11-server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28652 | |||
Oval ID: | oval:org.mitre.oval:def:28652 | ||
Title: | RHSA-2014:1982 -- xorg-x11-server security update (Important) | ||
Description: | X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Multiple integer overflow flaws and out-of-bounds write flaws were found in the way the X.Org server calculated memory requirements for certain X11 core protocol and GLX extension requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2014-8092, CVE-2014-8093, CVE-2014-8098) It was found that the X.Org server did not properly handle SUN-DES-1 (Secure RPC) authentication credentials. A malicious, unauthenticated client could use this flaw to crash the X.Org server by submitting a specially crafted authentication request. (CVE-2014-8091) Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server, or leak memory contents to the client. (CVE-2014-8097) Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server. (CVE-2014-8095, CVE-2014-8096, CVE-2014-8099, CVE-2014-8100, CVE-2014-8101, CVE-2014-8102) All xorg-x11-server users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1982 CESA-2014:1982 CVE-2014-8091 CVE-2014-8092 CVE-2014-8093 CVE-2014-8095 CVE-2014-8096 CVE-2014-8097 CVE-2014-8098 CVE-2014-8099 CVE-2014-8100 CVE-2014-8101 CVE-2014-8102 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | xorg-x11-server |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-07-16 | IAVM : 2015-A-0160 - Multiple Vulnerabilities in Oracle Linux and Virtualization Severity : Category I - VMSKEY : V0061123 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-07-16 | Name : The application installed on the remote host is affected by multiple vulnerab... File : oracle_secure_global_desktop_jul_2015_cpu.nasl - Type : ACT_GATHER_INFO |
2015-06-10 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201504-06.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0047-1.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-119.nasl - Type : ACT_GATHER_INFO |
2015-03-27 | Name : The remote Fedora host is missing a security update. File : fedora_2015-3964.nasl - Type : ACT_GATHER_INFO |
2015-03-27 | Name : The remote Fedora host is missing a security update. File : fedora_2015-3948.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-120.nasl - Type : ACT_GATHER_INFO |
2015-03-23 | Name : The remote Fedora host is missing a security update. File : fedora_2015-3953.nasl - Type : ACT_GATHER_INFO |
2015-01-16 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-470.nasl - Type : ACT_GATHER_INFO |
2015-01-15 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_xorg-x11-Xvnc-141217.nasl - Type : ACT_GATHER_INFO |
2014-12-29 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-815.nasl - Type : ACT_GATHER_INFO |
2014-12-23 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-356-03.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141211_xorg_x11_server_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141211_xorg_x11_server_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1983.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1982.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1983.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1982.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_27b9b2f0808111e4b4cabcaec565249c.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3095.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1983.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1982.nasl - Type : ACT_GATHER_INFO |
2014-12-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2436-1.nasl - Type : ACT_GATHER_INFO |
2014-12-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2436-2.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:43:13 |
|
2023-02-13 05:28:13 |
|
2023-02-03 00:28:28 |
|
2021-05-05 01:16:12 |
|
2021-05-04 12:34:53 |
|
2021-04-22 01:42:21 |
|
2020-05-23 01:53:32 |
|
2020-05-23 00:42:35 |
|
2017-01-03 09:23:00 |
|
2016-12-31 09:24:21 |
|
2016-12-22 09:23:40 |
|
2016-10-26 09:22:43 |
|
2016-10-18 12:04:05 |
|
2016-06-29 00:40:55 |
|
2016-04-12 00:24:45 |
|
2015-10-18 17:22:57 |
|
2015-07-18 13:28:23 |
|
2015-07-17 09:19:36 |
|
2015-06-11 13:27:36 |
|
2015-05-21 13:31:45 |
|
2015-05-06 13:27:39 |
|
2015-05-05 13:28:52 |
|
2015-04-09 17:25:51 |
|
2015-04-03 09:26:47 |
|
2015-03-31 13:28:56 |
|
2015-03-28 13:27:12 |
|
2015-03-27 13:28:40 |
|
2015-03-25 13:28:25 |
|
2015-03-06 09:23:33 |
|
2015-01-22 17:23:34 |
|
2015-01-18 13:25:05 |
|
2015-01-16 13:24:53 |
|
2014-12-30 13:25:09 |
|
2014-12-24 13:25:30 |
|
2014-12-17 09:23:40 |
|
2014-12-16 13:25:32 |
|
2014-12-12 00:22:43 |
|
2014-12-11 17:22:50 |
|
2014-12-11 13:25:09 |
|
2014-12-10 21:25:29 |
|