CVE-2014-0209
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
15/05/2014
Last modified:
12/04/2025
Description
Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:* | 1.4.7 (including) | |
| cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x:libxfont:1.4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0278.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html
- http://lists.x.org/archives/xorg-announce/2014-May/002431.html
- http://rhn.redhat.com/errata/RHSA-2014-1893.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/59154
- http://www.debian.org/security/2014/dsa-2927
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A145
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/67382
- http://www.ubuntu.com/usn/USN-2211-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://advisories.mageia.org/MGASA-2014-0278.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html
- http://lists.x.org/archives/xorg-announce/2014-May/002431.html
- http://rhn.redhat.com/errata/RHSA-2014-1893.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/59154
- http://www.debian.org/security/2014/dsa-2927
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A145
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/67382
- http://www.ubuntu.com/usn/USN-2211-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html



