[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-470 --- xorg-x11-server

ID: oval:org.secpod.oval:def:1200028Date: (C)2015-12-28   (M)2023-12-07
Class: PATCHFamily: unix




Multiple integer overflow flaws and out-of-bounds write flaws were found in the way the X.Org server calculated memory requirements for certain X11 core protocol and GLX extension requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges. It was found that the X.Org server did not properly handle SUN-DES-1 authentication credentials. A malicious, unauthenticated client could use this flaw to crash the X.Org server by submitting a specially crafted authentication request. Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server, or leak memory contents to the client. An integer overflow flaw was found in the way the X.Org server calculated memory requirements for certain DRI2 extension requests. A malicious, authenticated client could use this flaw to crash the X.Org server. Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server

Platform:
Amazon Linux AMI
Product:
xorg-x11-server
Reference:
ALAS-2015-470
CVE-2014-8099
CVE-2014-8098
CVE-2014-8097
CVE-2014-8096
CVE-2014-8095
CVE-2014-8094
CVE-2014-8093
CVE-2014-8092
CVE-2014-8091
CVE-2014-8101
CVE-2014-8100
CVE-2014-8103
CVE-2014-8102
CVE    13
CVE-2014-8103
CVE-2014-8102
CVE-2014-8099
CVE-2014-8098
...
CPE    2
cpe:/o:amazon:linux
cpe:/a:x.org:xorg-x11-server

© SecPod Technologies