First published: Wed Dec 10 2014(Updated: )
The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =7.0 | |
X.org X.org | =4.0 | |
X.Org xorg-server | <=1.16.2.99.901 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8095 is considered a high severity vulnerability due to its potential to cause denial of service or execute arbitrary code.
To fix CVE-2014-8095, update the X.Org Server to version 1.16.3 or later.
CVE-2014-8095 affects users of X.Org Server versions prior to 1.16.3 and specific versions of Debian Linux.
CVE-2014-8095 can be exploited through crafted length or index values leading to out-of-bounds read or write operations.
While specific exploits are not publicly documented, the vulnerability's characteristics suggest it can be leveraged to execute arbitrary code.