187
VMScore

CVE-2018-15854

Published: 25/08/2018 Updated: 06/08/2019
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Unchecked NULL pointer usage in xkbcommon prior to 0.8.1 could be used by local malicious users to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xkbcommon project xkbcommon

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

Vendor Advisories

Synopsis Moderate: Xorg security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for Xorg is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base sco ...
Debian Bug report logs - #907302 CVE-2018-15864 CVE-2018-15863 CVE-2018-15862 CVE-2018-15861 CVE-2018-15859 CVE-2018-15858 CVE-2018-15857 CVE-2018-15856 CVE-2018-15855 CVE-2018-15854 CVE-2018-15853 Package: src:libxkbcommon; Maintainer for src:libxkbcommon is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Mor ...
Several security issues were fixed in libxkbcommon ...
Several security issues were fixed in libxkbcommon ...
It was discovered that libX11 does not properly validate input coming from the server, causing XListExtensions() and XGetFontPath() functions to produce an invalid list of elements that in turn make XFreeExtensionsList() and XFreeFontPath() access invalid memory An attacker who can either configure a malicious X server or modify the data coming fr ...