fkie_cve-2014-8094
Vulnerability from fkie_nvd
Published
2014-12-10 15:59
Modified
2025-08-29 13:42
Severity ?
Summary
Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "341380D1-4ED6-423F-9B36-161ED5F7B1F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "D973D23A-902F-48BB-A511-4736BC0D4104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*",
"matchCriteriaId": "23A006F0-96AD-4278-A1CA-CEB0A02C702A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B60D5E9-3B1B-4DDD-AB19-22DA2DDB08DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE0B2A2-D4CE-4CD8-9651-2158D345ECD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*",
"matchCriteriaId": "4538D70B-26C8-4171-A7A9-83381D303169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "45A1B47E-E43E-4E21-B5BE-314B011B11E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "E0384572-4B10-4FDA-AA59-E2EA5F5123EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "56BFFEE5-3E53-40DF-82AC-07AF9E281DDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2818087C-78CE-48A3-ADF3-82F62D5C17B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*",
"matchCriteriaId": "7D829B2F-042A-40C4-97B4-83514C275FBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*",
"matchCriteriaId": "881209FF-373E-433D-81A1-DDD275D499E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0254289D-BA19-4078-97BF-FD4D5D71B409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*",
"matchCriteriaId": "C67AD4A2-D0E4-4862-AEA2-001C9C53E451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*",
"matchCriteriaId": "159D5A32-B0AE-4C70-9134-3FFAA7DC3618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C6715A92-5B54-4808-803D-EF91DE50C6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*",
"matchCriteriaId": "E0626223-CD4B-43C5-8897-F429EC6E9909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB9631D-FEC5-4D07-8EFE-F001DEE81B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7186AEC9-9EF0-4B35-923D-2C7F16BA62C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4B6F9D-443B-400A-81E5-8698D4B069FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0A37BA-B49C-4202-AFAA-6414A8E2E2A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D82A098B-FB21-4BC1-A63E-27A2BB46BBC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "68020AB6-C11D-4F77-957A-86D50A4C8C53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA72958-4E84-412F-AFEE-9C6F74F0026A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "2290A3CD-8B9C-4414-A056-FFC1DE105F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "EE437F00-74F4-49BF-8BC3-FCDE253C95F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EA0A4215-D1DF-4424-BC4F-E3DD82E02FAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "D31E17FB-39BB-4034-85D9-5AA54FC7E039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*",
"matchCriteriaId": "1ECC0E0B-D48E-45FD-BCE0-9B32CBB049D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE9C98A-16AC-4426-9103-5AD78D74E049",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D5CFF2-C841-4DB1-ABA3-BCA3320434A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*",
"matchCriteriaId": "F83808C5-85DE-4F8A-91F9-58A95EE93010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0AAD75D4-5CE3-484B-BA29-B69ACE6EF6F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "B5046EB4-C972-4154-97D8-A56727A87325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "80CA2668-7141-4FA8-B8D7-4B26D00C1632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "224313C7-F712-4305-BF43-D3E26E2D545E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "E751CB1D-0B7D-41C8-A1BD-1FD797FD9B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*",
"matchCriteriaId": "B5EEA7B1-E6A0-4F2A-9486-0582542744B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*",
"matchCriteriaId": "0FE05BC0-CF0A-4278-8A57-A236043AFE58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*",
"matchCriteriaId": "70CFB379-6400-4092-9A31-E7F053ED3F0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47638BB2-002C-4EDE-AE76-C3922BCB863A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "D55B82A8-BB15-45CC-BB0D-FAF349264872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F7EB32-D68A-4C55-8ACA-C5398097EBE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CC260B4A-4BDE-45C4-9BA7-67F0324EFF24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E7068E-133F-4CF5-9FD3-16BC680FB4CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "2F984996-0EC2-4371-8C1F-D1EEF8B527EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "65D00C11-2543-43AC-BA0F-37F8ED010E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E51CA2A0-4D45-4E00-8842-B8A490E581F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*",
"matchCriteriaId": "43FA7CD1-4FFD-4E4C-B7CE-38040F282956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*",
"matchCriteriaId": "92CF2D98-5ABB-4BCB-8103-E1A278ECA546",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "85973DBF-4BEA-43DA-A9AF-48631804D441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*",
"matchCriteriaId": "35503433-6435-48F0-B8B1-0C59614319E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "85B02CC1-A9D3-479B-B432-7E49C5E4EF95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "A5E46110-AD69-4F68-A289-F5D594C8122F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "3B919D4C-0A74-41FB-A0C6-DC5854EE7E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*",
"matchCriteriaId": "53781084-26B3-4B51-9485-3862DC6C98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "08BEDBAE-9D2D-4AF3-866E-995C795E97CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "96F2E1ED-CBE3-4CA4-8ACD-406240A2E9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*",
"matchCriteriaId": "45A8A463-44B8-4E7D-8CD8-0E8D70285BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6432FC-4C00-4304-A12F-47FE9F46F60D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "8089C1BE-BE36-49D8-A634-A118909571F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*",
"matchCriteriaId": "DB34B10D-6EA5-4522-9C92-BDC0EBC54E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "133B7E40-DDFE-40D0-8D68-F4282D9ED4EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "229A1287-C584-4F11-9F28-CD5B3AD50FFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "688BAB71-E24C-4BE9-875C-942D36CFED8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A2DD5322-9872-4E2D-8E17-FBE5875447C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*",
"matchCriteriaId": "7B3E1D85-79EC-4C5A-A3D3-95651E3DF7D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*",
"matchCriteriaId": "C48410E9-501F-4B52-9B09-7F30ACC8B568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0C64541A-64C4-4611-AD62-4E18DB4C22EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9B3D2E-90A5-4024-A415-3E5AEC5B778B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "00A25CA7-B139-4F44-98C4-8B6168AC8C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B1BD8B-0575-48C5-A654-6D02817EEE6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "779F9971-BC4F-4277-9379-7CCD96145226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B30773C2-5544-42E3-A1A3-C351FF9D8FDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "A62DF23D-1586-4083-BD8D-068B446A311E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*",
"matchCriteriaId": "C2AAF6F8-7B8F-4A58-A129-13A7A34DE298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE3F3FE-D807-4813-BBDC-671F7DACC666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "3AC75115-1D75-4FD3-A421-79280A9FC590",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "37A1819B-F054-4154-BA14-A41409D81952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D8713B9A-2948-422B-A6D6-7D6B434AB653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*",
"matchCriteriaId": "69D09A6D-28E5-4202-8F46-F73BB09703F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*",
"matchCriteriaId": "AFC5128B-687C-45E6-8D9E-79839BBD6530",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A40E273F-0AE7-46DB-8768-8C7F16BC6BE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78DB6B76-0F98-481D-ABAE-D7C39455534F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "651EC529-390C-4D9F-B5B6-3CB74BDAF428",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "EB37AE7F-B984-4CB6-94B8-F73FA3DA5075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "9C132E6E-4852-42EB-A873-7028EA0CA981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*",
"matchCriteriaId": "EAD6C5E3-A7C5-4BCF-A8A0-199C432D9B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95AAF901-BAE0-4433-933F-657426761F81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "02492DB9-4323-4223-9AC5-EDF75828DD27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*",
"matchCriteriaId": "5DE09200-9F51-4E8D-B02F-094262BA9E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA7FD19-9F41-4D4B-AC99-AC44EC5C665C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*",
"matchCriteriaId": "94301CA5-C17D-452A-8120-2457DDB5C86E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C332E17-DD83-4BA9-BA99-081CDEE47F39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "F6373F0C-40ED-46C6-BE04-4BFC5C5A9542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "2E490485-DC76-4F79-AE3F-274920FF72C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6B4DE1CB-EA39-42DC-BF77-5045719D6CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*",
"matchCriteriaId": "22D50072-14AD-4F2B-8AE3-292B8C0E1540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4BFF81-F350-4FC7-A16E-32868942465F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F925658-F627-4C87-AFC2-D9317791F419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A5BA77-F374-4326-98F9-60EC9C12834B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "E651A7E3-51DC-4D63-B73E-727FCCE46702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*",
"matchCriteriaId": "3970628F-16BC-4F42-9AF9-5AAD25DC3C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*",
"matchCriteriaId": "E9710576-8C8F-43E1-9093-60BBD4BCC526",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0753F0-5E81-41F6-A0ED-519E39AC9B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE72B024-802A-4636-B561-7C717994A04B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA0AE68-8BB7-41B1-8CD3-50F85132656F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*",
"matchCriteriaId": "FBD88DB1-0AC6-4E1C-8185-5E1E79609ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F75FB959-0E55-4D66-84CB-1F8FABBF7665",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "65870381-8A4D-442F-8285-7D7AD0ECBB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "663707C8-7D94-4BB5-A90C-12EF48F416D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "DCE2D5F5-B131-43D2-81D7-6772987CF9DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "D655D215-4CFD-4B0D-86B6-08D9306C8B24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8874A701-6293-40D8-B377-468353987B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2E0876-563D-470C-B506-41B4FAEC5EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "DECF49D1-9C72-4E6B-9671-81B05D5F2470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "60845133-F984-4EA7-A4B7-DED62E901EB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ECE6E44-C29D-43E0-B9EC-9C5BEB6427DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FC59F1-962B-433A-B619-B7BE2759F12C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "E27ADE44-10B6-4EDC-B555-4514D7CD97D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*",
"matchCriteriaId": "7D198773-B5C3-4C10-9B7C-B9741EB275CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B455524F-BD1B-4C7F-8A8F-A090729F1108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "902B9EC8-CB3F-493B-B509-F889630FB225",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "62E383FE-D142-4CEA-A4C4-91F7D08033C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA57045-CB6B-4D91-874E-AD8C687AF8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "58D9E2DF-2476-4616-8AB2-073F239A2BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*",
"matchCriteriaId": "20D39B5C-AF57-4C84-8D01-70EB86A8CA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6CCD42BF-9879-4DEC-8AE9-9F4E66EF3603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4A7CB197-D476-4273-873D-39CDF3B3BA92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*",
"matchCriteriaId": "F557AAC8-7101-4261-9B54-1EFDE2EA1A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7DB9A6-00CC-4E79-A463-5D5FFF488A78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*",
"matchCriteriaId": "971A3642-74F8-49D9-881F-28B126893991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA77024-50DA-4583-A04A-CA8CC41B9661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6F30E9FF-66D0-4032-9AF1-3BE15B5BE4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9D65DF6A-925E-4CF5-81E1-2A64DC812819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "274DD859-5FE8-469D-B87C-51A2593A7A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "84FC2F2B-A1EF-4938-A78D-8C3DFFEE2918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "E251A7BC-23CB-442E-9960-ADF12E86D0DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "703FE652-5E06-49D4-8FD8-DF11813E4F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEFE4FF-9FFC-4096-A9DE-54D7296E9328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*",
"matchCriteriaId": "5F812E87-91C4-40D5-B129-2D9F426630A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*",
"matchCriteriaId": "009F6683-A633-4386-8924-87EC74D5A749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B7FB2C4-D0B2-40C3-A8D5-59B0DBA27C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFA5EEA-9EB7-4517-9B86-CD753DBBDDD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7613D913-CDDE-438C-ABD9-E733310B4593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A1D3E81-495C-44F9-A637-2DEBFB5D6DB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "16D964F5-E650-4B76-9B9C-19968E450D9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*",
"matchCriteriaId": "FF71F52A-C526-44CB-82D7-12B30715ACDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*",
"matchCriteriaId": "38ACEDD6-88EF-4DF6-B6CA-14A5F1D81637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6F093B-4658-4E85-BAEA-4B357323212A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C788B9A-A648-42D6-9B7F-0C1FCAEA22C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC79686-4B35-4A0D-BFF3-BE49785D9FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B12F160-EAFB-4DCB-8493-82461891F95B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*",
"matchCriteriaId": "5A619AD4-998D-422F-8418-51CBB58C1347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA94041-8EC3-4252-A581-37F95CBA7BF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5C0EB2-8725-4DB2-8C66-AF659C18DE36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*",
"matchCriteriaId": "AA52E096-0A34-4F53-93C1-0834FC121BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1C288F-326B-497B-B26C-D26E01262DDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write."
},
{
"lang": "es",
"value": "Desbordamiento de enteros en la funci\u00f3n ProcDRI2GetBuffers en la extensi\u00f3n DRI2 en X.Org Server (tambi\u00e9n conocido como xserver y xorg-server) 1.7.0 hasta 1.16.x anterior a 1.16.3 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada, lo que provoca una lectura o escritura fuera de rango."
}
],
"evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/190.html\"\u003eCWE-190: Integer Overflow or Wraparound\u003c/a\u003e",
"id": "CVE-2014-8094",
"lastModified": "2025-08-29T13:42:30.557",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-12-10T15:59:06.863",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0532.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/61947"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required"
],
"url": "http://secunia.com/advisories/62292"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3095"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/71601"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/201504-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0532.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/61947"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://secunia.com/advisories/62292"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3095"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/71601"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201504-06"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…