First published: Wed Dec 10 2014(Updated: )
X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu X Server Legacy | <=1.16.2 | |
X.org X.org | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8091 is classified as a medium severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2014-8091, upgrade the X.Org Server to version 1.16.3 or later.
CVE-2014-8091 affects X.Org Server versions prior to 1.16.3 and X11 version 5.0.
CVE-2014-8091 is a memory management vulnerability that can lead to a denial of service due to insufficient checks on malloc return values.
Yes, CVE-2014-8091 can be exploited remotely, allowing attackers to cause service disruptions.