FreeBSD : xorg server -- Multiple vulnerabilities (b14cabf7-5663-11f0-943a-18c04d5ea3dc)

medium Nessus Plugin ID 241126

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the b14cabf7-5663-11f0-943a-18c04d5ea3dc advisory.

The X.Org project reports:
The X Rendering extension allows creating animated cursors providing a list of cursors.
By default, the Xserver assumes at least one cursor is provided while a client may actually pass no cursor at all, which causes an out-of-bound read creating the animated cursor and a crash of the Xserver.
The handler of XFixesSetClientDisconnectMode does not check the client request length.
A client could send a shorter request and read data from a former request.
When reading requests from the clients, the input buffer might be shared and used between different clients.
If a given client sends a full request with non-zero bytes to ignore, the bytes to ignore may still be non-zero even though the request is full, in which case the buffer could be shared with another client who's request will not be processed because of those bytes to ignore, leading to a possible hang of the other client request.
The RecordSanityCheckRegisterClients() function in the X Record extension implementation of the Xserver checks for the request length, but does not check for integer overflow.
A client might send a very large value for either the number of clients or the number of protocol ranges that will cause an integer overflow in the request length computation, defeating the check for request length.
A client might send a request causing an integer overflow when computing the total size to allocate in RRChangeProviderProperty().

Tenable has extracted the preceding description block directly from the FreeBSD security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://lists.x.org/archives/xorg/2025-June/062055.html

http://www.nessus.org/u?ef6d15c4

Plugin Details

Severity: Medium

ID: 241126

File Name: freebsd_pkg_b14cabf7566311f0943a18c04d5ea3dc.nasl

Version: 1.1

Type: local

Published: 7/1/2025

Updated: 7/1/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 5.2

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:P

CVSS Score Source: CVE-2025-49177

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xorg-nextserver, p-cpe:/a:freebsd:freebsd:xephyr, p-cpe:/a:freebsd:freebsd:xorg-server, p-cpe:/a:freebsd:freebsd:xwayland, p-cpe:/a:freebsd:freebsd:xorg-vfbserver, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 7/1/2025

Vulnerability Publication Date: 6/17/2025

Reference Information

CVE: CVE-2025-49175, CVE-2025-49177, CVE-2025-49178, CVE-2025-49179, CVE-2025-49180