CVE-2017-13720
Published: 5 October 2017
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
Priority
Status
Package | Release | Status |
---|---|---|
libxfont Launchpad, Ubuntu, Debian |
trusty |
Released
(1:1.4.7-1ubuntu0.3)
|
upstream |
Needs triage
|
|
xenial |
Released
(1:1.5.1-1ubuntu0.16.04.3)
|
|
zesty |
Released
(1:2.0.1-3ubuntu0.1)
|
|
Patches: upstream: https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 |
||
libxfont1 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
zesty |
Released
(1:1.5.2-4ubuntu0.1)
|
|
libxfont2 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
upstream |
Needs triage
|
|
xenial |
Released
(1:2.0.1-3~ubuntu16.04.2)
|
|
zesty |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.1 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |