First published: Wed Dec 10 2014(Updated: )
The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu X Server Legacy | <=1.16.2.99.901 | |
X.org X.org | =6.8 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8102 has a severity rating that may lead to denial of service or potential execution of arbitrary code.
To fix CVE-2014-8102, update the X.Org Server to version 1.16.3 or later.
CVE-2014-8102 affects users of the X.Org X Window System, particularly those using versions before 1.16.3.
Yes, CVE-2014-8102 can be exploited by remote authenticated users.
CVE-2014-8102 impacts systems running specific versions of the X.Org X Server, X11, and Debian GNU/Linux.