Bug 1168705 (CVE-2014-8097) - CVE-2014-8097 xorg-x11-server: out of bounds access due to not validating length or offset values in DBE extension
Summary: CVE-2014-8097 xorg-x11-server: out of bounds access due to not validating len...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-8097
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1170916 1170917 1170918 1170919 1170932
Blocks: 1168310
TreeView+ depends on / blocked
 
Reported: 2014-11-27 15:55 UTC by Vasyl Kaigorodov
Modified: 2021-02-17 05:57 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server, or leak memory contents to the client.
Clone Of:
Environment:
Last Closed: 2014-12-11 20:57:07 UTC
Embargoed:


Attachments (Terms of Use)
0007-dbe_unvalidated_lengths_in_DbeSwapBuffers_calls_CVE-2014-8097.patch (2.43 KB, text/plain)
2014-11-27 15:55 UTC, Vasyl Kaigorodov
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1982 0 normal SHIPPED_LIVE Important: xorg-x11-server security update 2014-12-11 22:34:45 UTC
Red Hat Product Errata RHSA-2014:1983 0 normal SHIPPED_LIVE Important: xorg-x11-server security update 2014-12-12 00:41:58 UTC

Description Vasyl Kaigorodov 2014-11-27 15:55:30 UTC
ProcDbeSwapBuffers() and SProcDbeSwapBuffers() DBE extension calls do not check that the lengths and/or indexes sent by the
client are within the bounds specified by the caller or the bounds of
the memory allocated to hold the request read from the client, so could
read or write past the bounds of allocated memory while processing the
request. These calls all occur only after a client has successfully
authenticated itself.

Introduced in X11R6.1 (1996).

Comment 1 Vasyl Kaigorodov 2014-11-27 15:55:54 UTC
Created attachment 962137 [details]
0007-dbe_unvalidated_lengths_in_DbeSwapBuffers_calls_CVE-2014-8097.patch

Comment 2 Huzaifa S. Sidhpurwala 2014-12-05 05:57:29 UTC
Integer overflow causing OOB read and crash. Could also result in OOB data being sent to the client, resulting in potential information leaks.

Comment 5 Vincent Danen 2014-12-09 20:17:45 UTC
External References:

http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/

Comment 6 errata-xmlrpc 2014-12-11 17:35:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:1982 https://rhn.redhat.com/errata/RHSA-2014-1982.html

Comment 7 errata-xmlrpc 2014-12-11 19:42:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2014:1983 https://rhn.redhat.com/errata/RHSA-2014-1983.html


Note You need to log in before you can comment on or make changes to this bug.