CVE-2017-13720

EUVD-2017-5237
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.1 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Affected Products (NVD)
VendorProductVersion
x.orglibxfont
𝑥
≤ 1.5.2
x.orglibxfont
2.0.0
x.orglibxfont
2.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxfont
bookworm
1:2.0.6-1
fixed
bullseye
1:2.0.4-1
fixed
sid
1:2.0.6-1
fixed
trixie
1:2.0.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxfont
trusty
Fixed 1:1.4.7-1ubuntu0.3
released
xenial
Fixed 1:1.5.1-1ubuntu0.16.04.3
released
zesty
Fixed 1:2.0.1-3ubuntu0.1
released
libxfont1
trusty
dne
xenial
dne
zesty
Fixed 1:1.5.2-4ubuntu0.1
released
libxfont2
trusty
dne
xenial
Fixed 1:2.0.1-3~ubuntu16.04.2
released
zesty
dne