CVE-2014-8096

The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0532.html Third Party Advisory
http://secunia.com/advisories/61947
http://secunia.com/advisories/62292 Permissions Required Third Party Advisory
http://www.debian.org/security/2014/dsa-3095 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:119 Broken Link
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html Third Party Advisory
http://www.securityfocus.com/bid/71598
http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/ Patch Vendor Advisory
https://security.gentoo.org/glsa/201504-06
http://advisories.mageia.org/MGASA-2014-0532.html Third Party Advisory
http://secunia.com/advisories/61947
http://secunia.com/advisories/62292 Permissions Required Third Party Advisory
http://www.debian.org/security/2014/dsa-3095 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:119 Broken Link
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html Third Party Advisory
http://www.securityfocus.com/bid/71598
http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/ Patch Vendor Advisory
https://security.gentoo.org/glsa/201504-06
Configurations

Configuration 1 (hide)

cpe:2.3:a:x.org:x11:6.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:18

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0532.html - Third Party Advisory () http://advisories.mageia.org/MGASA-2014-0532.html - Third Party Advisory
References () http://secunia.com/advisories/61947 - () http://secunia.com/advisories/61947 -
References () http://secunia.com/advisories/62292 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/62292 - Permissions Required, Third Party Advisory
References () http://www.debian.org/security/2014/dsa-3095 - Third Party Advisory () http://www.debian.org/security/2014/dsa-3095 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:119 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2015:119 - Broken Link
References () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - Third Party Advisory
References () http://www.securityfocus.com/bid/71598 - () http://www.securityfocus.com/bid/71598 -
References () http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/ - Patch, Vendor Advisory () http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/ - Patch, Vendor Advisory
References () https://security.gentoo.org/glsa/201504-06 - () https://security.gentoo.org/glsa/201504-06 -

Information

Published : 2014-12-10 15:59

Updated : 2024-11-21 02:18


NVD link : CVE-2014-8096

Mitre link : CVE-2014-8096

CVE.ORG link : CVE-2014-8096


JSON object : View

Products Affected

x.org

  • xorg-server
  • x11

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer