Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2015-3164

Disclosure Date: July 01, 2015
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • opensuse,
  • x.org

Products

  • opensuse 13.2,
  • xorg-server 1.16.0,
  • xorg-server 1.16.1,
  • xorg-server 1.16.1.901,
  • xorg-server 1.16.2,
  • xorg-server 1.16.2.901,
  • xorg-server 1.16.3,
  • xorg-server 1.16.4,
  • xorg-server 1.16.99.901,
  • xorg-server 1.16.99.902,
  • xorg-server 1.17.0,
  • xorg-server 1.17.1
Technical Analysis