CVE-2014-0211

EUVD-2014-0261
Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
Affected Products (NVD)
VendorProductVersion
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
canonicalubuntu_linux
13.10
canonicalubuntu_linux
14.04
xlibxfont
𝑥
≤ 1.4.7
xlibxfont
1.2.3
xlibxfont
1.2.4
xlibxfont
1.2.5
xlibxfont
1.2.6
xlibxfont
1.2.7
xlibxfont
1.2.8
xlibxfont
1.2.9
xlibxfont
1.3.0
xlibxfont
1.3.1
xlibxfont
1.3.2
xlibxfont
1.3.3
xlibxfont
1.3.4
xlibxfont
1.4.0
xlibxfont
1.4.1
xlibxfont
1.4.2
xlibxfont
1.4.3
xlibxfont
1.4.4
xlibxfont
1.4.5
xlibxfont
1.4.6
xlibxfont
1.4.99
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxfont
bookworm
1:2.0.6-1
fixed
bullseye
1:2.0.4-1
fixed
sid
1:2.0.6-1
fixed
trixie
1:2.0.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxfont
lucid
Fixed 1:1.4.1-1ubuntu0.3
released
precise
Fixed 1:1.4.4-1ubuntu0.2
released
quantal
Fixed 1:1.4.5-2ubuntu0.12.10.2
released
saucy
Fixed 1:1.4.6-1ubuntu0.2
released
trusty
not-affected
Common Weakness Enumeration