2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-3164" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2015-07-01T14:59:07.267" ,
"lastModified" : "2018-10-30T16:27:35.843" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket."
} ,
{
"lang" : "es" ,
"value" : "La configuraci\u00f3n de la autenticaci\u00f3n en XWayland 1.16.x y 1.17.x anterior a 1.17.2 arranca el servidor en el modo de no autenticaci\u00f3n, lo que permite a usuarios locales leer en o enviar informaci\u00f3n a clientes X11 arbitrarios a trav\u00e9s de vectores que involucran un socket UNIX."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:N" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 3.6
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A66E4428-470F-40EE-AD4C-879575AAC05A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D9AAD3B-0254-40EA-A1B0-EFA966DC0240"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.1.901:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40FC9093-238B-4090-9123-EDD038C53CB1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B58F5E3E-7CE6-49F5-A51C-8273B707FAEE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.2.901:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F47F463C-2DB0-4724-8E96-E598ED682DE4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9AB0E53A-AC9C-4E60-A3A7-F457AC5E5609"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C05406FE-0FCB-4BD4-8A05-1D99DE726F47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.99.901:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3D6BB48-AC01-4524-B82F-977F7929FB47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.16.99.902:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06E4BC4A-F828-479B-9515-3FAAF5000F88"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.17.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EB1AE9F-C293-401A-9B94-1CFCD8643963"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:x.org:xorg-server:1.17.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6A780AA4-866B-4970-901A-95D775DB2846"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.freedesktop.org/archives/wayland-devel/2015-June/022548.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-updates/2015-06/msg00044.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/75535" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://security.gentoo.org/glsa/201701-64" ,
"source" : "secalert@redhat.com"
}
]
}