Stack-based buffer overflow in libXfont - CVE-2013-6462
Published: January 9, 2014 / Updated: July 28, 2020
libXfont
X.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the bdfReadCharacters function in bitmap/bdfread.c when processing a long string in a character name in a BDF font file. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
- http://lists.x.org/archives/xorg-announce/2014-January/002389.html
- http://osvdb.org/101842
- http://rhn.redhat.com/errata/RHSA-2014-0018.html
- http://seclists.org/oss-sec/2014/q1/33
- http://secunia.com/advisories/56240
- http://secunia.com/advisories/56336
- http://secunia.com/advisories/56357
- http://secunia.com/advisories/56371
- http://www.debian.org/security/2014/dsa-2838
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.securityfocus.com/bid/64694
- http://www.ubuntu.com/usn/USN-2078-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90123