CVE-2014-0210

EUVD-2014-0260
Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
Affected Products (NVD)
VendorProductVersion
xlibxfont
𝑥
≤ 1.4.7
xlibxfont
1.2.3
xlibxfont
1.2.4
xlibxfont
1.2.5
xlibxfont
1.2.6
xlibxfont
1.2.7
xlibxfont
1.2.8
xlibxfont
1.2.9
xlibxfont
1.3.0
xlibxfont
1.3.1
xlibxfont
1.3.2
xlibxfont
1.3.3
xlibxfont
1.3.4
xlibxfont
1.4.0
xlibxfont
1.4.1
xlibxfont
1.4.2
xlibxfont
1.4.3
xlibxfont
1.4.4
xlibxfont
1.4.5
xlibxfont
1.4.6
xlibxfont
1.4.99
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
canonicalubuntu_linux
13.10
canonicalubuntu_linux
14.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxfont
bookworm
1:2.0.6-1
fixed
bullseye
1:2.0.4-1
fixed
sid
1:2.0.6-1
fixed
trixie
1:2.0.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxfont
lucid
Fixed 1:1.4.1-1ubuntu0.3
released
precise
Fixed 1:1.4.4-1ubuntu0.2
released
quantal
Fixed 1:1.4.5-2ubuntu0.12.10.2
released
saucy
Fixed 1:1.4.6-1ubuntu0.2
released
trusty
not-affected