Release Date: | 2014-12-09 | |
Impact: | Important | What is this? |
Multiple integer overflow flaws were found in the way the X.Org server calculated memory requirements for certain X11 core protocol requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges.
See more information about CVE-2014-8092 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 7.4 |
Vector String: | AV:A/AC:M/Au:S/C:C/I:C/A:C |
Version: | 2.0 |
Attack Vector: | Adjacent Network |
Attack Complexity: | Medium |
Authentication: | Single |
Confidentiality Impact: | Complete |
Integrity Impact: | Complete |
Availability Impact: | Complete |
Platform | Errata | Release Date |
Oracle Linux version 5 (xorg-x11-server) | ELSA-2014-1982 | 2014-12-11 |
Oracle Linux version 6 (xorg-x11-server) | ELSA-2014-1983 | 2014-12-11 |
Oracle Linux version 7 (xorg-x11-server) | ELSA-2014-1983 | 2014-12-11 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: