CVE-2014-8094

Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:x.org:xorg-server:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.0.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.1.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.3.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.3.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.4.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.4.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.5.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.5.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.6.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.6.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.99.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.99.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.7.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.0.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.1.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.99.903:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.99.904:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.8.99.905:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.0.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.3.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.3.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.4:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.4.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.5:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.9.99.903:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.0.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.1.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.3.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.3.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.4:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.6:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.10.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.1.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.3.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.3.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.4:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.99.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.99.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.11.99.903:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.0.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.1.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.3.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.3.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.4:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.99.903:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.99.904:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.12.99.905:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.0.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.4:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.13.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.1.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.2:rc1:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.2.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.2.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.3.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.3.901:rc1:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.4:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.4.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.5:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.5.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.6:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.7:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.3:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.903:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.904:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.14.99.905:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.99.902:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.99.903:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.15.99.904:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.16.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.16.0.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.16.1:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.16.1.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.16.2:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.16.2.99.901:*:*:*:*:*:*:*
cpe:2.3:a:x.org:xorg-server:1.16.2.901:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

13 Feb 2023, 00:42

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:1983', 'name': 'https://access.redhat.com/errata/RHSA-2014:1983', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1168691', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1168691', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2014-8094', 'name': 'https://access.redhat.com/security/cve/CVE-2014-8094', 'tags': [], 'refsource': 'MISC'}
Summary An integer overflow flaw was found in the way the X.Org server calculated memory requirements for certain DRI2 extension requests. A malicious, authenticated client could use this flaw to crash the X.Org server. Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.

02 Feb 2023, 20:18

Type Values Removed Values Added
Summary Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write. An integer overflow flaw was found in the way the X.Org server calculated memory requirements for certain DRI2 extension requests. A malicious, authenticated client could use this flaw to crash the X.Org server.
References
  • (MISC) https://access.redhat.com/errata/RHSA-2014:1983 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1168691 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2014-8094 -

Information

Published : 2014-12-10 15:59

Updated : 2023-12-10 11:31


NVD link : CVE-2014-8094

Mitre link : CVE-2014-8094

CVE.ORG link : CVE-2014-8094


JSON object : View

Products Affected

oracle

  • solaris

debian

  • debian_linux

x.org

  • xorg-server
CWE
CWE-190

Integer Overflow or Wraparound