ID CVE-2014-0211
Summary Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:x:libxfont:1.4.99:*:*:*:*:*:*:*
    cpe:2.3:a:x:libxfont:1.4.99:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 09-10-2018 - 19:38)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • bugzilla
    id 1096601
    title CVE-2014-0211 libXfont: integer overflows calculating memory needs for xfs replies
    oval
    OR
    • AND
      • OR
        • comment Red Hat Enterprise Linux 7 Client is installed
          oval oval:com.redhat.rhba:tst:20150364001
        • comment Red Hat Enterprise Linux 7 Server is installed
          oval oval:com.redhat.rhba:tst:20150364002
        • comment Red Hat Enterprise Linux 7 Workstation is installed
          oval oval:com.redhat.rhba:tst:20150364003
        • comment Red Hat Enterprise Linux 7 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20150364004
      • OR
        • AND
          • comment libXfont is earlier than 0:1.4.7-2.el7_0
            oval oval:com.redhat.rhsa:tst:20141870005
          • comment libXfont is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111154006
        • AND
          • comment libXfont-devel is earlier than 0:1.4.7-2.el7_0
            oval oval:com.redhat.rhsa:tst:20141870007
          • comment libXfont-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111154008
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhba:tst:20111656001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhba:tst:20111656002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhba:tst:20111656003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20111656004
      • OR
        • AND
          • comment libXfont is earlier than 0:1.4.5-4.el6_6
            oval oval:com.redhat.rhsa:tst:20141870013
          • comment libXfont is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111154006
        • AND
          • comment libXfont-devel is earlier than 0:1.4.5-4.el6_6
            oval oval:com.redhat.rhsa:tst:20141870014
          • comment libXfont-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111154008
    rhsa
    id RHSA-2014:1870
    released 2014-11-18
    severity Important
    title RHSA-2014:1870: libXfont security update (Important)
  • bugzilla
    id 1096601
    title CVE-2014-0211 libXfont: integer overflows calculating memory needs for xfs replies
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment libXfont is earlier than 0:1.2.2-1.0.6.el5_11
          oval oval:com.redhat.rhsa:tst:20141893002
        • comment libXfont is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070132003
      • AND
        • comment libXfont-devel is earlier than 0:1.2.2-1.0.6.el5_11
          oval oval:com.redhat.rhsa:tst:20141893004
        • comment libXfont-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070132005
    rhsa
    id RHSA-2014:1893
    released 2014-11-24
    severity Important
    title RHSA-2014:1893: libXfont security update (Important)
rpms
  • libXfont-0:1.4.7-2.el7_0
  • libXfont-devel-0:1.4.7-2.el7_0
  • libXfont-0:1.4.5-4.el6_6
  • libXfont-devel-0:1.4.5-4.el6_6
  • libXfont-0:1.2.2-1.0.6.el5_11
  • libXfont-devel-0:1.2.2-1.0.6.el5_11
refmap via4
bid 67382
bugtraq 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
confirm
debian DSA-2927
fulldisc 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
mandriva MDVSA-2015:145
mlist [xorg-announce] 20140513 [ANNOUNCE] X.Org Security Advisory: Multiple issues in libXfont
secunia 59154
suse openSUSE-SU-2014:0711
ubuntu USN-2211-1
Last major update 09-10-2018 - 19:38
Published 15-05-2014 - 14:55
Back to Top