Vulnerabilities > CVE-2015-3418 - Divide By Zero vulnerability in X.Org Xorg-Server

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
x-org
CWE-369
nessus

Summary

The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.

Vulnerable Configurations

Part Description Count
Application
X.Org
158

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201701-64.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201701-64 (X.Org X Server: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in X.Org X Server. Please review the CVE identifiers referenced below for details. Impact : An authenticated attacker could possibly cause a Denial of Service condition or read from or send information to arbitrary X11 clients. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id96786
    published2017-01-26
    reporterThis script is Copyright (C) 2017 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/96786
    titleGLSA-201701-64 : X.Org X Server: Multiple vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-120.NASL
    descriptionAndreas Cord-Landwehr reported an issue where the X.Org Xserver would often crash with an arithmetic exception when maximizing application windows. This issue (CVE-2015-3418) is a regression which got introduced by fixing CVE-2014-8092. The above referenced version of xorg-server in Debian squeeze-lts fixes this regression in the following way : The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check (in dix/dispatch.c). NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-03-26
    plugin id82103
    published2015-03-26
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/82103
    titleDebian DLA-120-2 : xorg-server regression update
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1025-1.NASL
    descriptionThis update for xorg-x11-server fixes a regression introduced with the fix for CVE-2014-8092 : CVE-2015-3418: Xserver: PutImage crashes Server when called with 0 height. (bsc#928520) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id84116
    published2015-06-11
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84116
    titleSUSE SLED11 / SLES11 Security Update : xorg-x11-server (SUSE-SU-2015:1025-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1127-1.NASL
    descriptionThe X Server was updated to fix 1 security issues and 4 bugs : Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id84396
    published2015-06-25
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84396
    titleSUSE SLED12 / SLES12 Security Update : xorg-x11-server (SUSE-SU-2015:1127-1)

Redhat

advisories
bugzilla
id1208094
titleXorg crashes with SIGFPE in ProcPutImage()
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 6 is installed
      ovaloval:com.redhat.rhba:tst:20111656003
    • OR
      • AND
        • commentxorg-x11-server-source is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445001
        • commentxorg-x11-server-source is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376182
      • AND
        • commentxorg-x11-server-Xephyr is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445003
        • commentxorg-x11-server-Xephyr is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376196
      • AND
        • commentxorg-x11-server-common is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445005
        • commentxorg-x11-server-common is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376194
      • AND
        • commentxorg-x11-server-Xnest is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445007
        • commentxorg-x11-server-Xnest is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376188
      • AND
        • commentxorg-x11-server-devel is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445009
        • commentxorg-x11-server-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376184
      • AND
        • commentxorg-x11-server-Xdmx is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445011
        • commentxorg-x11-server-Xdmx is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376186
      • AND
        • commentxorg-x11-server-Xvfb is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445013
        • commentxorg-x11-server-Xvfb is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376190
      • AND
        • commentxorg-x11-server-Xorg is earlier than 0:1.15.0-36.el6
          ovaloval:com.redhat.rhba:tst:20151445015
        • commentxorg-x11-server-Xorg is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20141376192
rhsa
idRHBA-2015:1445
released2015-07-20
severityNone
titleRHBA-2015:1445: xorg-x11-server bug fix and enhancement update (None)
rpms
  • xorg-x11-server-Xdmx-0:1.15.0-36.el6
  • xorg-x11-server-Xephyr-0:1.15.0-36.el6
  • xorg-x11-server-Xnest-0:1.15.0-36.el6
  • xorg-x11-server-Xorg-0:1.15.0-36.el6
  • xorg-x11-server-Xvfb-0:1.15.0-36.el6
  • xorg-x11-server-common-0:1.15.0-36.el6
  • xorg-x11-server-debuginfo-0:1.15.0-36.el6
  • xorg-x11-server-devel-0:1.15.0-36.el6
  • xorg-x11-server-source-0:1.15.0-36.el6