7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
libXfont.so is vulnerable to remote code execution. An buffer overflows in the functions _fs_recv_conn_setup
, fs_read_open_font
, fs_read_query_info
, fs_read_extent_info
, fs_read_glyphs
, fs_read_list
and fs_read_list_info function
allows a remote attacker to execute commands via a crafted xfs
protocol reply.
CPE | Name | Operator | Version |
---|---|---|---|
libxfont.so | eq | 1.4.1 | |
libxfont | eq | 1.4.5__3.el6_5 | |
libxfont | eq | 1.4.5__2.el6 | |
libxfont | eq | 1.4.1__2.el6_1 | |
libxfont | eq | 1.4.1__1.el6 |
advisories.mageia.org/MGASA-2014-0278.html
lists.opensuse.org/opensuse-updates/2014-05/msg00073.html
lists.x.org/archives/xorg-announce/2014-May/002431.html
rhn.redhat.com/errata/RHSA-2014-1893.html
seclists.org/fulldisclosure/2014/Dec/23
secunia.com/advisories/59154
www.debian.org/security/2014/dsa-2927
www.mandriva.com/security/advisories?name=MDVSA-2015:145
www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
www.securityfocus.com/archive/1/534161/100/0/threaded
www.securityfocus.com/bid/67382
www.ubuntu.com/usn/USN-2211-1
www.vmware.com/security/advisories/VMSA-2014-0012.html
github.com/freedesktop/libXfont/commit/491291cabf78efdeec8f18b09e14726a9030cc8f
github.com/freedesktop/libXfont/commit/520683652564c2a4e42328ae23eef9bb63271565
github.com/freedesktop/libXfont/commit/5fa73ac18474be3032ee7af9c6e29deab163ea39
github.com/freedesktop/libXfont/commit/891e084b26837162b12f841060086a105edde86d
github.com/freedesktop/libXfont/commit/a3f21421537620fc4e1f844a594a4bcd9f7e2bd8
github.com/freedesktop/libXfont/commit/cbb64aef35960b2882be721f4b8fbaa0fb649d12
github.com/freedesktop/libXfont/commit/d338f81df1e188eb16e1d6aeea7f4800f89c1218
github.com/freedesktop/libXfont/compare/05c8020a49416dd8b7510cbba45ce4f3fc81a7dc...d338f81df1e188eb16e1d6aeea7f4800f89c1218