[arch-security] [ASA-201412-14] xorg-server: multiple issues
Levente Polyak
anthraxx at archlinux.org
Fri Dec 12 18:02:24 UTC 2014
Arch Linux Security Advisory ASA-201412-14
==========================================
Severity: Critical
Date : 2014-12-12
CVE-ID : CVE-2014-8091 CVE-2014-8092 CVE-2014-8093 CVE-2014-8094
CVE-2014-8095 CVE-2014-8096 CVE-2014-8097 CVE-2014-8098
CVE-2014-8099 CVE-2014-8100 CVE-2014-8101 CVE-2014-8102
CVE-2014-8103
Package : xorg-server
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE-2014
Summary
=======
The package xorg-server before version 1.16.2.901-1 is vulnerable to
multiple issues including but not limited to denial of service and
possibly arbitrary code execution.
Resolution
==========
Upgrade to 1.16.2.901-1.
# pacman -Syu "xorg-server>=1.16.2.901-1"
The problems have been fixed upstream in version 1.16.2.901.
Workaround
==========
None.
Description
===========
- CVE-2014-8091 (denial of service)
X.Org X Window System, when using SUN-DES-1 (Secure RPC) authentication
credentials, does not check the return value of a malloc call, which
allows remote attackers to cause a denial of service (NULL pointer
dereference and server crash) via a crafted connection request.
- CVE-2014-8092 (arbitrary code execution)
A flaw allow remote authenticated users to cause a denial of service or
possibly execute arbitrary code via a crafted request to various
affected functions, which triggers an out-of-bounds read or write.
- CVE-2014-8093 (arbitrary code execution)
Multiple integer overflows allow remote authenticated users to cause a
denial of service or possibly execute arbitrary code via a crafted
request to various affected functions, which triggers an out-of-bounds
read or write.
- CVE-2014-8094 (arbitrary code execution)
Integer overflow in the ProcDRI2GetBuffers function in the DRI2
extension allows remote authenticated users to cause a denial of service
or possibly execute arbitrary code via a crafted request, which triggers
an out-of-bounds read or write.
- CVE-2014-8095 (arbitrary code execution)
The XInput extension allows remote authenticated users to cause a denial
of service (out-of-bounds read or write) or possibly execute arbitrary
code via a crafted length or index value to various affected functions.
- CVE-2014-8096 (arbitrary code execution)
The SProcXCMiscGetXIDList function in the XC-MISC extension allows
remote authenticated users to cause a denial of service (out-of-bounds
read or write) or possibly execute arbitrary code via a crafted length
or index value.
- CVE-2014-8097 (arbitrary code execution)
The DBE extension allows remote authenticated users to cause a denial of
service (out-of-bounds read or write) or possibly execute arbitrary code
via a crafted length or index value to various affected functions.
- CVE-2014-8098 (arbitrary code execution)
The GLX extension allows remote authenticated users to cause a denial of
service (out-of-bounds read or write) or possibly execute arbitrary code
via a crafted length or index value to various affected functions.
- CVE-2014-8099 (arbitrary code execution)
The XVideo extension allows remote authenticated users to cause a denial
of service (out-of-bounds read or write) or possibly execute arbitrary
code via a crafted length or index value to various affected function.
- CVE-2014-8100 (arbitrary code execution)
The Render extension allows remote authenticated users to cause a denial
of service (out-of-bounds read or write) or possibly execute arbitrary
code via a crafted length or index value to various affected functions.
- CVE-2014-8101 (arbitrary code execution)
The RandR extension allows remote authenticated users to cause a denial
of service (out-of-bounds read or write) or possibly execute arbitrary
code via a crafted length or index value to various affected functions.
- CVE-2014-8102 (arbitrary code execution)
The SProcXFixesSelectSelectionInput function in the XFixes extension
allows remote authenticated users to cause a denial of service
(out-of-bounds read or write) or possibly execute arbitrary code via a
crafted length value.
- CVE-2014-8103 (arbitrary code execution)
A flaw allows remote authenticated users to cause a denial of service
(out-of-bounds read or write) or possibly execute arbitrary code via a
crafted length or index value to various affected functions in the DRI3
or Present extension.
Impact
======
An authenticated attacker, either locally or remotely, is able to cause
a denial of service or possibly execute arbitrary code via crafted calls
to various affected functions.
References
==========
http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
http://lists.x.org/archives/xorg-announce/2014-December/002501.html
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8091
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8092
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8093
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8094
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8095
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8096
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8097
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8098
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8099
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8100
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8101
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8102
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8103
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20141212/7673f1fc/attachment.bin>
More information about the arch-security
mailing list