CVE-2017-13720
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
11/10/2017
Last modified:
20/04/2025
Description
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Base Score 2.0
3.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:* | 1.5.2 (including) | |
| cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2017/dsa-3995
- https://bugzilla.redhat.com/show_bug.cgi?id=1500690
- https://bugzilla.suse.com/show_bug.cgi?id=1054285
- https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
- https://security.gentoo.org/glsa/201711-08
- https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2
- http://www.debian.org/security/2017/dsa-3995
- https://bugzilla.redhat.com/show_bug.cgi?id=1500690
- https://bugzilla.suse.com/show_bug.cgi?id=1054285
- https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
- https://security.gentoo.org/glsa/201711-08
- https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2



