First published: Wed Jun 11 2014(Updated: )
Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.13 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =13.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Workstation Extension | =12 | |
SUSE Linux Enterprise Server | =12 | |
DirectFB | =1.4.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2977 has a medium severity rating, as it can lead to denial of service and potential remote code execution.
To fix CVE-2014-2977, update your DirectFB to a version above 1.4.13 or apply the security patches provided by your operating system vendor.
CVE-2014-2977 affects DirectFB 1.4.13 and several versions of openSUSE and SUSE Linux Enterprise products.
CVE-2014-2977 is categorized as an integer signedness error that can lead to buffer overflow vulnerabilities.
Yes, CVE-2014-2977 can be exploited remotely via the Voodoo interface, resulting in a denial of service or potential arbitrary code execution.