// For flags

CVE-2014-8103

xorg-x11-server: out of bounds access due to not validating length or offset values in DRI3 & Present extensions

Severity Score

6.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.

X.Org Server (también conocido como xserver y xorg-server) 1.15.0 hasta 1.16.x anterior a 1.16.3 permite a usuarios remotos autenticados causar una denegación de servicio (lectura o escritura fuera de rango) o posiblemente ejecutar código arbitrario a través de un valor de longitud o de indice manipulado en la función (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, o (12) sproc_present_query_capabilities en la extensión (a) DRI3 o (b) Present.

Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-10-10 CVE Reserved
  • 2014-12-09 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-125: Out-of-bounds Read
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.0
Search vendor "X.org" for product "Xorg-server" and version "1.15.0"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.0.901
Search vendor "X.org" for product "Xorg-server" and version "1.15.0.901"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.1
Search vendor "X.org" for product "Xorg-server" and version "1.15.1"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.2
Search vendor "X.org" for product "Xorg-server" and version "1.15.2"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.99.901
Search vendor "X.org" for product "Xorg-server" and version "1.15.99.901"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.99.902
Search vendor "X.org" for product "Xorg-server" and version "1.15.99.902"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.99.903
Search vendor "X.org" for product "Xorg-server" and version "1.15.99.903"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.15.99.904
Search vendor "X.org" for product "Xorg-server" and version "1.15.99.904"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.16.0
Search vendor "X.org" for product "Xorg-server" and version "1.16.0"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.16.0.901
Search vendor "X.org" for product "Xorg-server" and version "1.16.0.901"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.16.1
Search vendor "X.org" for product "Xorg-server" and version "1.16.1"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.16.1.901
Search vendor "X.org" for product "Xorg-server" and version "1.16.1.901"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.16.2
Search vendor "X.org" for product "Xorg-server" and version "1.16.2"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.16.2.99.901
Search vendor "X.org" for product "Xorg-server" and version "1.16.2.99.901"
-
Affected
X.org
Search vendor "X.org"
Xorg-server
Search vendor "X.org" for product "Xorg-server"
1.16.2.901
Search vendor "X.org" for product "Xorg-server" and version "1.16.2.901"
-
Affected