6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.7 High
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.5%
Package : xorg-server
Version : 2:1.7.7-18+deb6u3
CVE ID : CVE-2015-3418
Debian Bug : #774308
Andreas Cord-Landwehr reported an issue where the X.Org Xserver would
often crash with an arithmetic exception when maximizing application
windows.
This issue (CVE-2015-3418) is a regression which got introduced by fixing
CVE-2014-8092. The above referenced version of xorg-server in Debian
squeeze-lts fixes this regression in the following way:
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check (in dix/dispatch.c).
–
mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148
GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31
mail: [email protected], http://sunweavers.net
Attachment:
signature.asc
Description: Digital signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | mipsel | xserver-xorg-core | < 2:1.12.4-6+deb7u6 | xserver-xorg-core_2:1.12.4-6+deb7u6_mipsel.deb |
Debian | 7 | mipsel | xserver-xorg-core-udeb | < 2:1.12.4-6+deb7u6 | xserver-xorg-core-udeb_2:1.12.4-6+deb7u6_mipsel.deb |
Debian | 7 | sparc | xserver-xorg-core | < 2:1.12.4-6+deb7u6 | xserver-xorg-core_2:1.12.4-6+deb7u6_sparc.deb |
Debian | 7 | kfreebsd-amd64 | xserver-xephyr | < 2:1.12.4-6+deb7u6 | xserver-xephyr_2:1.12.4-6+deb7u6_kfreebsd-amd64.deb |
Debian | 7 | mipsel | xnest | < 2:1.12.4-6+deb7u6 | xnest_2:1.12.4-6+deb7u6_mipsel.deb |
Debian | 7 | armel | xnest | < 2:1.12.4-6+deb7u6 | xnest_2:1.12.4-6+deb7u6_armel.deb |
Debian | 7 | ia64 | xvfb | < 2:1.12.4-6+deb7u6 | xvfb_2:1.12.4-6+deb7u6_ia64.deb |
Debian | 7 | kfreebsd-i386 | xnest | < 2:1.12.4-6+deb7u6 | xnest_2:1.12.4-6+deb7u6_kfreebsd-i386.deb |
Debian | 7 | amd64 | xserver-xorg-dev | < 2:1.12.4-6+deb7u6 | xserver-xorg-dev_2:1.12.4-6+deb7u6_amd64.deb |
Debian | 7 | ia64 | xserver-xorg-dev | < 2:1.12.4-6+deb7u6 | xserver-xorg-dev_2:1.12.4-6+deb7u6_ia64.deb |
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.7 High
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.5%