CVE-2017-13720Out-of-bounds Read in Libxfont

Severity
7.1HIGHNVD
EPSS
0.1%
top 80.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 11
Latest updateMay 17

Description

In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

Debianx.org/libxfont< 1:2.0.1-4+3
Ubuntux.org/libxfont< 1:1.4.7-1ubuntu0.3+1
NVDx.org/libxfont1.5.2+2

Patches

🔴Vulnerability Details

4
GHSA
GHSA-jrrp-87j9-7387: In the PatternMatch function in fontfile/fontdir2022-05-17
CVEList
CVE-2017-13720: In the PatternMatch function in fontfile/fontdir2017-10-11
OSV
CVE-2017-13720: In the PatternMatch function in fontfile/fontdir2017-10-11
OSV
libxfont, libxfont1, libxfont2 vulnerabilities2017-10-10

📋Vendor Advisories

3
Ubuntu
libXfont vulnerabilities2017-10-10
Red Hat
libXfont: Insufficient input validation in fontdir.c2017-10-04
Debian
CVE-2017-13720: libxfont - In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and...2017

💬Community

3
Bugzilla
CVE-2017-13720 libXfont: Insufficient input validation in fontdir.c2017-10-11
Bugzilla
CVE-2017-13720 CVE-2017-13722 libXfont: various flaws [fedora-all]2017-10-11
Bugzilla
CVE-2017-13720 CVE-2017-13722 libXfont2: various flaws [fedora-all]2017-10-11