CVE-2013-6462
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
09/01/2014
Last modified:
11/04/2025
Description
Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:x:libxfont:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
- http://lists.x.org/archives/xorg-announce/2014-January/002389.html
- http://osvdb.org/101842
- http://rhn.redhat.com/errata/RHSA-2014-0018.html
- http://seclists.org/oss-sec/2014/q1/33
- http://secunia.com/advisories/56240
- http://secunia.com/advisories/56336
- http://secunia.com/advisories/56357
- http://secunia.com/advisories/56371
- http://www.debian.org/security/2014/dsa-2838
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.securityfocus.com/bid/64694
- http://www.ubuntu.com/usn/USN-2078-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90123
- http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
- http://lists.x.org/archives/xorg-announce/2014-January/002389.html
- http://osvdb.org/101842
- http://rhn.redhat.com/errata/RHSA-2014-0018.html
- http://seclists.org/oss-sec/2014/q1/33
- http://secunia.com/advisories/56240
- http://secunia.com/advisories/56336
- http://secunia.com/advisories/56357
- http://secunia.com/advisories/56371
- http://www.debian.org/security/2014/dsa-2838
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.securityfocus.com/bid/64694
- http://www.ubuntu.com/usn/USN-2078-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90123



