CVE-2014-0211

Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
VendorProductVersion
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
canonicalubuntu_linux
13.10
canonicalubuntu_linux
14.04
xlibxfont
𝑥
≤ 1.4.7
xlibxfont
1.2.3
xlibxfont
1.2.4
xlibxfont
1.2.5
xlibxfont
1.2.6
xlibxfont
1.2.7
xlibxfont
1.2.8
xlibxfont
1.2.9
xlibxfont
1.3.0
xlibxfont
1.3.1
xlibxfont
1.3.2
xlibxfont
1.3.3
xlibxfont
1.3.4
xlibxfont
1.4.0
xlibxfont
1.4.1
xlibxfont
1.4.2
xlibxfont
1.4.3
xlibxfont
1.4.4
xlibxfont
1.4.5
xlibxfont
1.4.6
xlibxfont
1.4.99
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxfont
bullseye
1:2.0.4-1
fixed
sid
1:2.0.6-1
fixed
trixie
1:2.0.6-1
fixed
bookworm
1:2.0.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxfont
trusty
not-affected
saucy
Fixed 1:1.4.6-1ubuntu0.2
released
quantal
Fixed 1:1.4.5-2ubuntu0.12.10.2
released
precise
Fixed 1:1.4.4-1ubuntu0.2
released
lucid
Fixed 1:1.4.1-1ubuntu0.3
released
Common Weakness Enumeration