CVE-2013-1993 – Mesa: Multiple integer overflows leading to heap-based bufer overflows
https://notcve.org/view.php?id=CVE-2013-1993
Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions. Múltiples desbordamientos de enteros en X.org libglx en Mesa v9.1.1 y anteriores permiten que los servidores X provoquen una asignación de memoria insuficiente y un desbordamiento de búfer a través de vectores relacionados con las funciones (1) XF86DRIOpenConnection y (2) XF86DRIGetClientDriverName. • http://advisories.mageia.org/MGASA-2013-0190.html http://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html http://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html http://rhn.redhat.com/errata/RHSA-2013-0897.html http://rhn.redhat.com/errata/RHSA-2013-0898.html http://www.debian.org/security/2013/dsa-2678 http://www.mandriva.com/security/advisories?name=MDVSA-2013:181 http://www.openwall • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •
CVE-2013-1940 – xorg-x11-server: Information disclosure due enabling events from hot-plug devices despite input from the device being momentarily disabled
https://notcve.org/view.php?id=CVE-2013-1940
X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty. X.Org X server anterior a v1.13.4 y v1.4.x anterior a v1.14.1 no restringe adecuadamente el acceso a los eventos de entrada cuando se añade un nuevo dispositivo de conexión en caliente, lo cual puede permitir a atacantes cercanos obtener información sensible, como se ha demostrado mediante la lectura de contraseñas de un tty. • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html http://www.debian.org/security/2013/dsa-2661 http://www.openwall.com/lists/oss-security/2013/04/18/3 http://www.ubuntu.com/usn/USN-1803-1 https://bugs.freedesktop.org/show_bug.cgi?id=63353 https://access.redhat.com/security/cve/CVE-2013-1940 https:/& • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-1699
https://notcve.org/view.php?id=CVE-2012-1699
The ProcSetEventMask function in difs/events.c in the xfs font server for X.Org X11R6 through X11R6.6 and XFree86 before 3.3.3 calls the SendErrToClient function with a mask value instead of a pointer, which allows local users to cause a denial of service (memory corruption and crash) or obtain potentially sensitive information from memory via a SetEventMask request that triggers an invalid pointer dereference. La función ProcSetEventMask en DEFI/events.c en el servidor de fuentes xfs para X.Org X11R6.6 y X11R6 hasta XFree86 antes de 3.3.3 llama a la función SendErrToClient con un valor de máscara en lugar de un puntero, lo que permite a usuarios locales provocar una denegación de servicio (corrupción de memoria y caída) u obtener información sensible de la memoria a través de una solicitud SetEventMask que dispara una desreferencia de puntero no válido. • http://invisible-island.net/ansification/ansify-xfs-cve.html http://lists.freedesktop.org/archives/xorg-announce/2012-July/002040.html http://marc.info/?l=bugtraq&m=135765511704334&w=2 http://twitter.com/bsdaemon/status/228958599790071809 https://blogs.oracle.com/sunsecurity/entry/cve_2012_1699_denial_of https://bugzilla.redhat.com/show_bug.cgi?id=842841 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19369 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-2118
https://notcve.org/view.php?id=CVE-2012-2118
Format string vulnerability in the LogVHdrMessageVerb function in os/log.c in X.Org X11 1.11 allows attackers to cause a denial of service or possibly execute arbitrary code via format string specifiers in an input device name. Vulnerabilidad de formato de cadena en la función LogVHdrMessageVerb en OS/log.c en X11 X.Org v1.11 permite a atacantes provocar una denegación de servicio o posiblemente ejecutar código arbitrario mediante especificadores de formato de cadena en el nombre de un dispositivo de entrada. • http://patchwork.freedesktop.org/patch/10001 http://www.openwall.com/lists/oss-security/2012/04/18/8 http://www.openwall.com/lists/oss-security/2012/04/19/2 http://www.securityfocus.com/bid/53150 https://exchange.xforce.ibmcloud.com/vulnerabilities/74930 • CWE-20: Improper Input Validation •
CVE-2012-0064
https://notcve.org/view.php?id=CVE-2012-0064
xkeyboard-config before 2.5 in X.Org before 7.6 enables certain XKB debugging functions by default, which allows physically proximate attackers to bypass an X screen lock via keyboard combinations that break the input grab. xkeyboard-config anterior a 2.5 en X.Org anterior a 7.6 habilita por defecto ciertas funciones de depuración XKB, lo que permite a atacantes físicamente próximos evadir un bloqueo de pantalla X a través de combinaciones de teclado que interrumpen la captura de entrada . • http://gu1.aeroxteam.fr/2012/01/19/bypass-screensaver-locker-program-xorg-111-and-up http://lists.x.org/archives/xorg-announce/2012-January/001797.html http://lists.x.org/archives/xorg-devel/2012-January/028691.html http://securitytracker.com/id?1026549 http://who-t.blogspot.com/2012/01/xkb-breaking-grabs-cve-2012-0064.html http://www.openwall.com/lists/oss-security/2012/01/19/6 http://www.osvdb.org/78445 http://www.x.org/wiki/Development/Security https://bugz • CWE-264: Permissions, Privileges, and Access Controls •