fkie_cve-2014-8094
Vulnerability from fkie_nvd
Published
2014-12-10 15:59
Modified
2025-08-29 13:42
Severity ?
Summary
Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:x_server:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "341380D1-4ED6-423F-9B36-161ED5F7B1F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "D973D23A-902F-48BB-A511-4736BC0D4104", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.0.902:*:*:*:*:*:*:*", "matchCriteriaId": "23A006F0-96AD-4278-A1CA-CEB0A02C702A", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B60D5E9-3B1B-4DDD-AB19-22DA2DDB08DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "9CE0B2A2-D4CE-4CD8-9651-2158D345ECD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.1.902:*:*:*:*:*:*:*", "matchCriteriaId": "4538D70B-26C8-4171-A7A9-83381D303169", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "45A1B47E-E43E-4E21-B5BE-314B011B11E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "E0384572-4B10-4FDA-AA59-E2EA5F5123EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "56BFFEE5-3E53-40DF-82AC-07AF9E281DDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "2818087C-78CE-48A3-ADF3-82F62D5C17B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.3.901:*:*:*:*:*:*:*", "matchCriteriaId": "7D829B2F-042A-40C4-97B4-83514C275FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.3.902:*:*:*:*:*:*:*", "matchCriteriaId": "881209FF-373E-433D-81A1-DDD275D499E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "0254289D-BA19-4078-97BF-FD4D5D71B409", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.4.901:*:*:*:*:*:*:*", "matchCriteriaId": "C67AD4A2-D0E4-4862-AEA2-001C9C53E451", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.4.902:*:*:*:*:*:*:*", "matchCriteriaId": "159D5A32-B0AE-4C70-9134-3FFAA7DC3618", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "C6715A92-5B54-4808-803D-EF91DE50C6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.5.901:*:*:*:*:*:*:*", "matchCriteriaId": "E0626223-CD4B-43C5-8897-F429EC6E9909", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.5.902:*:*:*:*:*:*:*", "matchCriteriaId": "0CB9631D-FEC5-4D07-8EFE-F001DEE81B74", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "7186AEC9-9EF0-4B35-923D-2C7F16BA62C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.6.901:*:*:*:*:*:*:*", "matchCriteriaId": "1E4B6F9D-443B-400A-81E5-8698D4B069FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.6.902:*:*:*:*:*:*:*", "matchCriteriaId": "DD0A37BA-B49C-4202-AFAA-6414A8E2E2A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "D82A098B-FB21-4BC1-A63E-27A2BB46BBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.99.1:*:*:*:*:*:*:*", "matchCriteriaId": "68020AB6-C11D-4F77-957A-86D50A4C8C53", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.99.2:*:*:*:*:*:*:*", "matchCriteriaId": "3BA72958-4E84-412F-AFEE-9C6F74F0026A", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "2290A3CD-8B9C-4414-A056-FFC1DE105F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.7.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "EE437F00-74F4-49BF-8BC3-FCDE253C95F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EA0A4215-D1DF-4424-BC4F-E3DD82E02FAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "D31E17FB-39BB-4034-85D9-5AA54FC7E039", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.0.902:*:*:*:*:*:*:*", "matchCriteriaId": "1ECC0E0B-D48E-45FD-BCE0-9B32CBB049D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2BE9C98A-16AC-4426-9103-5AD78D74E049", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "B4D5CFF2-C841-4DB1-ABA3-BCA3320434A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.1.902:*:*:*:*:*:*:*", "matchCriteriaId": "F83808C5-85DE-4F8A-91F9-58A95EE93010", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "0AAD75D4-5CE3-484B-BA29-B69ACE6EF6F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "B5046EB4-C972-4154-97D8-A56727A87325", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "80CA2668-7141-4FA8-B8D7-4B26D00C1632", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "224313C7-F712-4305-BF43-D3E26E2D545E", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "E751CB1D-0B7D-41C8-A1BD-1FD797FD9B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.99.903:*:*:*:*:*:*:*", "matchCriteriaId": "B5EEA7B1-E6A0-4F2A-9486-0582542744B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.99.904:*:*:*:*:*:*:*", "matchCriteriaId": "0FE05BC0-CF0A-4278-8A57-A236043AFE58", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.8.99.905:*:*:*:*:*:*:*", "matchCriteriaId": "70CFB379-6400-4092-9A31-E7F053ED3F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "47638BB2-002C-4EDE-AE76-C3922BCB863A", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "D55B82A8-BB15-45CC-BB0D-FAF349264872", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.0.902:*:*:*:*:*:*:*", "matchCriteriaId": "B9F7EB32-D68A-4C55-8ACA-C5398097EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CC260B4A-4BDE-45C4-9BA7-67F0324EFF24", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8E7068E-133F-4CF5-9FD3-16BC680FB4CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "2F984996-0EC2-4371-8C1F-D1EEF8B527EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "65D00C11-2543-43AC-BA0F-37F8ED010E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "E51CA2A0-4D45-4E00-8842-B8A490E581F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.3.901:*:*:*:*:*:*:*", "matchCriteriaId": "43FA7CD1-4FFD-4E4C-B7CE-38040F282956", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.3.902:*:*:*:*:*:*:*", "matchCriteriaId": "92CF2D98-5ABB-4BCB-8103-E1A278ECA546", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "85973DBF-4BEA-43DA-A9AF-48631804D441", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.4.901:*:*:*:*:*:*:*", "matchCriteriaId": "35503433-6435-48F0-B8B1-0C59614319E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "85B02CC1-A9D3-479B-B432-7E49C5E4EF95", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "A5E46110-AD69-4F68-A289-F5D594C8122F", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "3B919D4C-0A74-41FB-A0C6-DC5854EE7E05", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.9.99.903:*:*:*:*:*:*:*", "matchCriteriaId": "53781084-26B3-4B51-9485-3862DC6C98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "08BEDBAE-9D2D-4AF3-866E-995C795E97CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "96F2E1ED-CBE3-4CA4-8ACD-406240A2E9F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.0.902:*:*:*:*:*:*:*", "matchCriteriaId": "45A8A463-44B8-4E7D-8CD8-0E8D70285BB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F6432FC-4C00-4304-A12F-47FE9F46F60D", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "8089C1BE-BE36-49D8-A634-A118909571F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.1.902:*:*:*:*:*:*:*", "matchCriteriaId": "DB34B10D-6EA5-4522-9C92-BDC0EBC54E6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "133B7E40-DDFE-40D0-8D68-F4282D9ED4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "229A1287-C584-4F11-9F28-CD5B3AD50FFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "688BAB71-E24C-4BE9-875C-942D36CFED8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "A2DD5322-9872-4E2D-8E17-FBE5875447C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.3.901:*:*:*:*:*:*:*", "matchCriteriaId": "7B3E1D85-79EC-4C5A-A3D3-95651E3DF7D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.3.902:*:*:*:*:*:*:*", "matchCriteriaId": "C48410E9-501F-4B52-9B09-7F30ACC8B568", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "0C64541A-64C4-4611-AD62-4E18DB4C22EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "EC9B3D2E-90A5-4024-A415-3E5AEC5B778B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "00A25CA7-B139-4F44-98C4-8B6168AC8C49", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.10.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "C4B1BD8B-0575-48C5-A654-6D02817EEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "779F9971-BC4F-4277-9379-7CCD96145226", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "B30773C2-5544-42E3-A1A3-C351FF9D8FDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "A62DF23D-1586-4083-BD8D-068B446A311E", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.1.902:*:*:*:*:*:*:*", "matchCriteriaId": "C2AAF6F8-7B8F-4A58-A129-13A7A34DE298", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "CDE3F3FE-D807-4813-BBDC-671F7DACC666", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "3AC75115-1D75-4FD3-A421-79280A9FC590", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "37A1819B-F054-4154-BA14-A41409D81952", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "D8713B9A-2948-422B-A6D6-7D6B434AB653", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.3.901:*:*:*:*:*:*:*", "matchCriteriaId": "69D09A6D-28E5-4202-8F46-F73BB09703F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.3.902:*:*:*:*:*:*:*", "matchCriteriaId": "AFC5128B-687C-45E6-8D9E-79839BBD6530", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "A40E273F-0AE7-46DB-8768-8C7F16BC6BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.99.1:*:*:*:*:*:*:*", "matchCriteriaId": "78DB6B76-0F98-481D-ABAE-D7C39455534F", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.99.2:*:*:*:*:*:*:*", "matchCriteriaId": "651EC529-390C-4D9F-B5B6-3CB74BDAF428", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "EB37AE7F-B984-4CB6-94B8-F73FA3DA5075", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "9C132E6E-4852-42EB-A873-7028EA0CA981", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.11.99.903:*:*:*:*:*:*:*", "matchCriteriaId": "EAD6C5E3-A7C5-4BCF-A8A0-199C432D9B75", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "95AAF901-BAE0-4433-933F-657426761F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "02492DB9-4323-4223-9AC5-EDF75828DD27", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.0.902:*:*:*:*:*:*:*", "matchCriteriaId": "5DE09200-9F51-4E8D-B02F-094262BA9E09", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "1FA7FD19-9F41-4D4B-AC99-AC44EC5C665C", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.1.902:*:*:*:*:*:*:*", "matchCriteriaId": "94301CA5-C17D-452A-8120-2457DDB5C86E", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C332E17-DD83-4BA9-BA99-081CDEE47F39", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "F6373F0C-40ED-46C6-BE04-4BFC5C5A9542", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "2E490485-DC76-4F79-AE3F-274920FF72C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DE1CB-EA39-42DC-BF77-5045719D6CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.3.901:*:*:*:*:*:*:*", "matchCriteriaId": "22D50072-14AD-4F2B-8AE3-292B8C0E1540", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.3.902:*:*:*:*:*:*:*", "matchCriteriaId": "CE4BFF81-F350-4FC7-A16E-32868942465F", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "9F925658-F627-4C87-AFC2-D9317791F419", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "B5A5BA77-F374-4326-98F9-60EC9C12834B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "E651A7E3-51DC-4D63-B73E-727FCCE46702", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.99.903:*:*:*:*:*:*:*", "matchCriteriaId": "3970628F-16BC-4F42-9AF9-5AAD25DC3C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.99.904:*:*:*:*:*:*:*", "matchCriteriaId": "E9710576-8C8F-43E1-9093-60BBD4BCC526", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.12.99.905:*:*:*:*:*:*:*", "matchCriteriaId": "5E0753F0-5E81-41F6-A0ED-519E39AC9B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE72B024-802A-4636-B561-7C717994A04B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "5EA0AE68-8BB7-41B1-8CD3-50F85132656F", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.0.902:*:*:*:*:*:*:*", "matchCriteriaId": "FBD88DB1-0AC6-4E1C-8185-5E1E79609ADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "F75FB959-0E55-4D66-84CB-1F8FABBF7665", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "65870381-8A4D-442F-8285-7D7AD0ECBB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "663707C8-7D94-4BB5-A90C-12EF48F416D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "DCE2D5F5-B131-43D2-81D7-6772987CF9DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "D655D215-4CFD-4B0D-86B6-08D9306C8B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "8874A701-6293-40D8-B377-468353987B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "0A2E0876-563D-470C-B506-41B4FAEC5EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "DECF49D1-9C72-4E6B-9671-81B05D5F2470", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.13.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "60845133-F984-4EA7-A4B7-DED62E901EB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECE6E44-C29D-43E0-B9EC-9C5BEB6427DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FC59F1-962B-433A-B619-B7BE2759F12C", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "E27ADE44-10B6-4EDC-B555-4514D7CD97D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.1.902:*:*:*:*:*:*:*", "matchCriteriaId": "7D198773-B5C3-4C10-9B7C-B9741EB275CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B455524F-BD1B-4C7F-8A8F-A090729F1108", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "902B9EC8-CB3F-493B-B509-F889630FB225", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "62E383FE-D142-4CEA-A4C4-91F7D08033C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.2.902:*:*:*:*:*:*:*", "matchCriteriaId": "0CA57045-CB6B-4D91-874E-AD8C687AF8A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "58D9E2DF-2476-4616-8AB2-073F239A2BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.3.901:*:*:*:*:*:*:*", "matchCriteriaId": "20D39B5C-AF57-4C84-8D01-70EB86A8CA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.3.901:rc1:*:*:*:*:*:*", "matchCriteriaId": "6CCD42BF-9879-4DEC-8AE9-9F4E66EF3603", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "4A7CB197-D476-4273-873D-39CDF3B3BA92", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.4.901:*:*:*:*:*:*:*", "matchCriteriaId": "F557AAC8-7101-4261-9B54-1EFDE2EA1A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A7DB9A6-00CC-4E79-A463-5D5FFF488A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.5.901:*:*:*:*:*:*:*", "matchCriteriaId": "971A3642-74F8-49D9-881F-28B126893991", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.6:*:*:*:*:*:*:*", "matchCriteriaId": "4EA77024-50DA-4583-A04A-CA8CC41B9661", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F30E9FF-66D0-4032-9AF1-3BE15B5BE4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D65DF6A-925E-4CF5-81E1-2A64DC812819", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.2:*:*:*:*:*:*:*", "matchCriteriaId": "274DD859-5FE8-469D-B87C-51A2593A7A2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.3:*:*:*:*:*:*:*", "matchCriteriaId": "84FC2F2B-A1EF-4938-A78D-8C3DFFEE2918", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "E251A7BC-23CB-442E-9960-ADF12E86D0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "703FE652-5E06-49D4-8FD8-DF11813E4F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.903:*:*:*:*:*:*:*", "matchCriteriaId": "1AEFE4FF-9FFC-4096-A9DE-54D7296E9328", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.904:*:*:*:*:*:*:*", "matchCriteriaId": "5F812E87-91C4-40D5-B129-2D9F426630A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.14.99.905:*:*:*:*:*:*:*", "matchCriteriaId": "009F6683-A633-4386-8924-87EC74D5A749", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B7FB2C4-D0B2-40C3-A8D5-59B0DBA27C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "2DFA5EEA-9EB7-4517-9B86-CD753DBBDDD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "7613D913-CDDE-438C-ABD9-E733310B4593", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A1D3E81-495C-44F9-A637-2DEBFB5D6DB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "16D964F5-E650-4B76-9B9C-19968E450D9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.99.902:*:*:*:*:*:*:*", "matchCriteriaId": "FF71F52A-C526-44CB-82D7-12B30715ACDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.99.903:*:*:*:*:*:*:*", "matchCriteriaId": "38ACEDD6-88EF-4DF6-B6CA-14A5F1D81637", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.15.99.904:*:*:*:*:*:*:*", "matchCriteriaId": "0A6F093B-4658-4E85-BAEA-4B357323212A", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C788B9A-A648-42D6-9B7F-0C1FCAEA22C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.16.0.901:*:*:*:*:*:*:*", "matchCriteriaId": "3CC79686-4B35-4A0D-BFF3-BE49785D9FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B12F160-EAFB-4DCB-8493-82461891F95B", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.16.1.901:*:*:*:*:*:*:*", "matchCriteriaId": "5A619AD4-998D-422F-8418-51CBB58C1347", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "0DA94041-8EC3-4252-A581-37F95CBA7BF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.16.2.99.901:*:*:*:*:*:*:*", "matchCriteriaId": "2B5C0EB2-8725-4DB2-8C66-AF659C18DE36", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:x_server:1.16.2.901:*:*:*:*:*:*:*", "matchCriteriaId": "AA52E096-0A34-4F53-93C1-0834FC121BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B1C288F-326B-497B-B26C-D26E01262DDB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write." }, { "lang": "es", "value": "Desbordamiento de enteros en la funci\u00f3n ProcDRI2GetBuffers en la extensi\u00f3n DRI2 en X.Org Server (tambi\u00e9n conocido como xserver y xorg-server) 1.7.0 hasta 1.16.x anterior a 1.16.3 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada, lo que provoca una lectura o escritura fuera de rango." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/190.html\"\u003eCWE-190: Integer Overflow or Wraparound\u003c/a\u003e", "id": "CVE-2014-8094", "lastModified": "2025-08-29T13:42:30.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-10T15:59:06.863", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0532.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61947" }, { "source": "secalert@redhat.com", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/62292" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3095" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/71601" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201504-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://advisories.mageia.org/MGASA-2014-0532.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/62292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201504-06" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…