CVE-2013-6462

Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
References
Link Resource
http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63 Exploit Patch
http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
http://lists.x.org/archives/xorg-announce/2014-January/002389.html Vendor Advisory
http://osvdb.org/101842
http://rhn.redhat.com/errata/RHSA-2014-0018.html
http://seclists.org/oss-sec/2014/q1/33
http://secunia.com/advisories/56240 Vendor Advisory
http://secunia.com/advisories/56336
http://secunia.com/advisories/56357
http://secunia.com/advisories/56371
http://www.debian.org/security/2014/dsa-2838
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
http://www.securityfocus.com/bid/64694
http://www.ubuntu.com/usn/USN-2078-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/90123
http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63 Exploit Patch
http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
http://lists.x.org/archives/xorg-announce/2014-January/002389.html Vendor Advisory
http://osvdb.org/101842
http://rhn.redhat.com/errata/RHSA-2014-0018.html
http://seclists.org/oss-sec/2014/q1/33
http://secunia.com/advisories/56240 Vendor Advisory
http://secunia.com/advisories/56336
http://secunia.com/advisories/56357
http://secunia.com/advisories/56371
http://www.debian.org/security/2014/dsa-2838
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
http://www.securityfocus.com/bid/64694
http://www.ubuntu.com/usn/USN-2078-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/90123
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:x:libxfont:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:x:libxfont:1.4.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:59

Type Values Removed Values Added
References () http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63 - Exploit, Patch () http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63 - Exploit, Patch
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html -
References () http://lists.x.org/archives/xorg-announce/2014-January/002389.html - Vendor Advisory () http://lists.x.org/archives/xorg-announce/2014-January/002389.html - Vendor Advisory
References () http://osvdb.org/101842 - () http://osvdb.org/101842 -
References () http://rhn.redhat.com/errata/RHSA-2014-0018.html - () http://rhn.redhat.com/errata/RHSA-2014-0018.html -
References () http://seclists.org/oss-sec/2014/q1/33 - () http://seclists.org/oss-sec/2014/q1/33 -
References () http://secunia.com/advisories/56240 - Vendor Advisory () http://secunia.com/advisories/56240 - Vendor Advisory
References () http://secunia.com/advisories/56336 - () http://secunia.com/advisories/56336 -
References () http://secunia.com/advisories/56357 - () http://secunia.com/advisories/56357 -
References () http://secunia.com/advisories/56371 - () http://secunia.com/advisories/56371 -
References () http://www.debian.org/security/2014/dsa-2838 - () http://www.debian.org/security/2014/dsa-2838 -
References () http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html - () http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -
References () http://www.securityfocus.com/bid/64694 - () http://www.securityfocus.com/bid/64694 -
References () http://www.ubuntu.com/usn/USN-2078-1 - () http://www.ubuntu.com/usn/USN-2078-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/90123 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/90123 -

Information

Published : 2014-01-09 18:55

Updated : 2024-11-21 01:59


NVD link : CVE-2013-6462

Mitre link : CVE-2013-6462

CVE.ORG link : CVE-2013-6462


JSON object : View

Products Affected

x

  • libxfont
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer