FreeBSD : xorg-server -- Information leak in the XkbSetGeometry request of X servers. (54a69cf7-b2ef-11e4-b1f1-bcaec565249c)

medium Nessus Plugin ID 81332

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Peter Hutterer reports :

Olivier Fourdan from Red Hat has discovered a protocol handling issue in the way the X server code base handles the XkbSetGeometry request.

The issue stems from the server trusting the client to send valid string lengths in the request data. A malicious client with string lengths exceeding the request length can cause the server to copy adjacent memory data into the XKB structs. This data is then available to the client via the XkbGetGeometry request. The data length is at least up to 64k, it is possible to obtain more data by chaining strings, each string length is then determined by whatever happens to be in that 16-bit region of memory.

A similarly crafted request can likely cause the X server to crash.

Solution

Update the affected packages.

See Also

https://lists.freedesktop.org/archives/xorg/2015-February/057158.html

http://www.nessus.org/u?7fd55e61

Plugin Details

Severity: Medium

ID: 81332

File Name: freebsd_pkg_54a69cf7b2ef11e4b1f1bcaec565249c.nasl

Version: 1.6

Type: local

Published: 2/13/2015

Updated: 1/6/2021

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xorg-server, p-cpe:/a:freebsd:freebsd:xorg-server, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/12/2015

Vulnerability Publication Date: 2/10/2015

Reference Information

CVE: CVE-2015-0255