Vulnerability Details : CVE-2013-6462
Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-6462
Probability of exploitation activity in the next 30 days: 21.69%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-6462
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2013-6462
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6462
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90123
X.Org libXfont BDF buffer overflow CVE-2013-6462 Vulnerability Report
-
http://lists.x.org/archives/xorg-announce/2014-January/002389.html
X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfontVendor Advisory
-
http://www.debian.org/security/2014/dsa-2838
-
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
Oracle Critical Patch Update - April 2014
-
http://rhn.redhat.com/errata/RHSA-2014-0018.html
RHSA-2014:0018 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
openSUSE-SU-2014:0075-1: moderate: update for libXfont
-
http://www.ubuntu.com/usn/USN-2078-1
USN-2078-1: libXfont vulnerability | Ubuntu security notices
-
http://www.securityfocus.com/bid/64694
X.Org libXfont BDF Font File Handling Stack Buffer Overflow Vulnerability
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
openSUSE-SU-2014:0073-1: moderate: update for libXfont
-
http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
xorg/lib/libXfont - X font handling library for server & utilities (mirrored from https://gitlab.freedesktop.org/xorg/lib/libxfont)Exploit;Patch
-
http://seclists.org/oss-sec/2014/q1/33
oss-sec: Fwd: X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfont
Products affected by CVE-2013-6462
- cpe:2.3:a:x:libxfont:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.4:*:*:*:*:*:*:*