CVE-2014-8098
Summary
| CVE | CVE-2014-8098 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-12-10 15:59:00 UTC |
| Updated | 2023-02-13 00:42:00 UTC |
| Description | The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Application | X.org | X11 | 6.7 | All | All | All |
| Application | X.org | X11 | 6.7 | All | All | All |
| Application | X.org | Xfree86 | 4.0 | All | All | All |
| Application | X.org | Xfree86 | 4.0 | All | All | All |
| Application | X.org | Xorg-server | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Support / Security / Advisories / / MDVSA-2015:119 | Mandriva | MANDRIVA | www.mandriva.com | Broken Link |
| Oracle Bulletin Board Update - January 2015 | CONFIRM | www.oracle.com | Third Party Advisory |
| Mageia Advisory: MGASA-2014-0532 - Updated x11-server packages fix security vulnerabilities | CONFIRM | advisories.mageia.org | Third Party Advisory |
| access.redhat.com | CVE-2014-8098 | MISC | access.redhat.com | |
| Security Advisory SA62292 - SUSE update for xorg-x11-server - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| CVE-2014-8298: GLX-INDIRECT (Including CVE-2014-8093, CVE-2014-8098) | CONFIRM | nvidia.custhelp.com | Third Party Advisory |
| Advisory-2014-12-09 | CONFIRM | www.x.org | Patch, Vendor Advisory |
| Oracle Critical Patch Update - July 2015 | CONFIRM | www.oracle.com | Third Party Advisory |
| Security Advisory SA61947 - SUSE update for xorg-x11-server - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| X.Org X Server Protocol Handling Multiple Out-of-Bounds Memory Corruption Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Debian -- Security Information -- DSA-3095-1 xorg-server | DEBIAN | www.debian.org | Third Party Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| 1168707 – (CVE-2014-8098) CVE-2014-8098 xorg-x11-server: out of bounds access due to not validating length or offset values in GLX extension | MISC | bugzilla.redhat.com | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| X.Org X Server: Multiple vulnerabilities (GLSA 201504-06) — Gentoo security | GENTOO | security.gentoo.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.