CVE-2015-3164
Published Jul 1, 2015
Last updated 6 years ago
Overview
- Description
- The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.6
- Impact score
- 4.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A66E4428-470F-40EE-AD4C-879575AAC05A" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D9AAD3B-0254-40EA-A1B0-EFA966DC0240" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.1.901:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40FC9093-238B-4090-9123-EDD038C53CB1" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B58F5E3E-7CE6-49F5-A51C-8273B707FAEE" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.2.901:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F47F463C-2DB0-4724-8E96-E598ED682DE4" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AB0E53A-AC9C-4E60-A3A7-F457AC5E5609" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C05406FE-0FCB-4BD4-8A05-1D99DE726F47" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.99.901:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3D6BB48-AC01-4524-B82F-977F7929FB47" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.16.99.902:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06E4BC4A-F828-479B-9515-3FAAF5000F88" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.17.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EB1AE9F-C293-401A-9B94-1CFCD8643963" }, { "criteria": "cpe:2.3:a:x.org:xorg-server:1.17.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A780AA4-866B-4970-901A-95D775DB2846" } ], "operator": "OR" } ] } ]