First published: Wed Dec 10 2014(Updated: )
The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
XFree86 | =4.2.0 | |
X.Org Xserver | <=1.16.2.99.901 | |
Oracle Xorg-x11-drv-void | =6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8101 is classified as a moderate severity vulnerability that can lead to denial of service or potential remote code execution.
To mitigate CVE-2014-8101, update to XFree86 version 4.2.1 or later, or X.Org Server version 1.16.3 or later.
CVE-2014-8101 affects systems using XFree86 4.2.0, X.Org Server versions below 1.16.3, and X11R6.7.
Yes, CVE-2014-8101 can be exploited by remote authenticated users to trigger denial of service or execute arbitrary code.
The impact of CVE-2014-8101 includes potential data breaches and system stability issues due to out-of-bounds reads or writes.