7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
libXfont.so is vulnerable to remote code execution. An integer overflow bug in the functions fs_get_reply
, fs_alloc_glyphs
and fs_read_extent_info
allows a remote attacker to execute commands via a crafted xfs
reply that triggers a buffer overflow.
CPE | Name | Operator | Version |
---|---|---|---|
libxfont.so | eq | 1.4.1 | |
libxfont | eq | 1.4.1__2.el6_1 | |
libxfont | eq | 1.4.5__3.el6_5 | |
libxfont | eq | 1.4.5__2.el6 | |
libxfont | eq | 1.4.1__1.el6 |
advisories.mageia.org/MGASA-2014-0278.html
lists.opensuse.org/opensuse-updates/2014-05/msg00073.html
lists.x.org/archives/xorg-announce/2014-May/002431.html
rhn.redhat.com/errata/RHSA-2014-1893.html
seclists.org/fulldisclosure/2014/Dec/23
secunia.com/advisories/59154
www.debian.org/security/2014/dsa-2927
www.mandriva.com/security/advisories?name=MDVSA-2015:145
www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
www.securityfocus.com/archive/1/534161/100/0/threaded
www.securityfocus.com/bid/67382
www.ubuntu.com/usn/USN-2211-1
www.vmware.com/security/advisories/VMSA-2014-0012.html
github.com/freedesktop/libXfont/commit/0f1a5d372c143f91a602bdf10c917d7eabaee09b
github.com/freedesktop/libXfont/commit/a42f707f8a62973f5e8bbcd08afb10a79e9cee33
github.com/freedesktop/libXfont/commit/c578408c1fd4db09e4e3173f8a9e65c81cc187c1