CVE-2017-13720

In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
VendorProductVersion
x.orglibxfont
𝑥
≤ 1.5.2
x.orglibxfont
2.0.0
x.orglibxfont
2.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxfont
bullseye
1:2.0.4-1
fixed
bookworm
1:2.0.6-1
fixed
sid
1:2.0.6-1
fixed
trixie
1:2.0.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxfont
zesty
Fixed 1:2.0.1-3ubuntu0.1
released
xenial
Fixed 1:1.5.1-1ubuntu0.16.04.3
released
trusty
Fixed 1:1.4.7-1ubuntu0.3
released
libxfont1
zesty
Fixed 1:1.5.2-4ubuntu0.1
released
xenial
dne
trusty
dne
libxfont2
zesty
dne
xenial
Fixed 1:2.0.1-3~ubuntu16.04.2
released
trusty
dne