First published: Wed Dec 10 2014(Updated: )
Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org X.org | =1.0 | |
Ubuntu X Server Legacy | <=1.16.2.99.901 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8092 has a severity rating that can lead to denial of service or potential remote code execution.
To fix CVE-2014-8092, you should upgrade the X.Org Server to version 1.16.3 or later.
CVE-2014-8092 affects users of X11R1 and X.Org Server versions prior to 1.16.3.
CVE-2014-8092 can be exploited through crafted requests that lead to integer overflow vulnerabilities.
CVE-2014-8092 was disclosed in 2014 and relates to vulnerabilities found in earlier versions of X.Org software.