X. Org X Server protocol to handle Multiple Integer Overflow Vulnerabilities
Release date:
Updated on:
Affected Systems:
X.org X11
Description:
Bugtraq id: 71595
CVE (CAN) ID: CVE-2014-8092
X. Org Server is the official reference implementation of X Window System. It is an open-source free software.
When the X. Org X Server calculates the memory required by the request, the X11 Core Protocol Request has an integer overflow vulnerability. Attackers can exploit this vulnerability to obtain sensitive information or cause a denial of service.
<* Source: Ilja van Sprundel (ilja@suresec.org)
*>
Suggestion:
Vendor patch:
X.org
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
This article permanently updates the link address: