First published: Wed Jun 11 2014(Updated: )
The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libdirectfb-1 | =1.4.4 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Workstation Extension | =12 | |
SUSE Linux Enterprise Server | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2978 is classified as a denial-of-service vulnerability that could also allow for arbitrary code execution.
To address CVE-2014-2978, it is recommended to upgrade DirectFB to a version that has patched the vulnerability.
CVE-2014-2978 affects DirectFB version 1.4.4 and various SUSE Linux distributions including openSUSE 13.1 and 13.2.
Yes, CVE-2014-2978 can be exploited remotely via the Voodoo interface to trigger an out-of-bounds write.
The impact of CVE-2014-2978 includes potential system crashes and the possibility of executing arbitrary code.