9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
libXfont is vulnerable to denial of service. A stack-based buffer overflow occurs when the libXfont library parsed Glyph Bitmap Distribution Format (BDF) fonts with a long string in a character name. This allows a local attacker to crash the service or potentially execute arbitrary code with the privileges of the X.Org server.
CPE | Name | Operator | Version |
---|---|---|---|
libxfont | eq | 1.4.1__2.el6_1 | |
libxfont | eq | 1.4.5__2.el6 | |
libxfont | eq | 1.4.1__1.el6 |
cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
lists.x.org/archives/xorg-announce/2014-January/002389.html
osvdb.org/101842
rhn.redhat.com/errata/RHSA-2014-0018.html
seclists.org/oss-sec/2014/q1/33
secunia.com/advisories/56240
secunia.com/advisories/56336
secunia.com/advisories/56357
secunia.com/advisories/56371
www.debian.org/security/2014/dsa-2838
www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
www.securityfocus.com/bid/64694
www.ubuntu.com/usn/USN-2078-1
access.redhat.com/security/updates/classification/#important
exchange.xforce.ibmcloud.com/vulnerabilities/90123
rhn.redhat.com/errata/RHSA-2014-0018.html