Vulnerability Details : CVE-2013-6462
Potential exploit
Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2013-6462
- cpe:2.3:a:x:libxfont:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:x:libxfont:1.4.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-6462
9.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-6462
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2013-6462
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6462
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90123
X.Org libXfont BDF buffer overflow CVE-2013-6462 Vulnerability Report
-
http://lists.x.org/archives/xorg-announce/2014-January/002389.html
X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfontVendor Advisory
-
http://www.debian.org/security/2014/dsa-2838
-
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
Oracle Critical Patch Update - April 2014
-
http://rhn.redhat.com/errata/RHSA-2014-0018.html
RHSA-2014:0018 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html
openSUSE-SU-2014:0075-1: moderate: update for libXfont
-
http://www.ubuntu.com/usn/USN-2078-1
USN-2078-1: libXfont vulnerability | Ubuntu security notices
-
http://www.securityfocus.com/bid/64694
X.Org libXfont BDF Font File Handling Stack Buffer Overflow Vulnerability
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html
openSUSE-SU-2014:0073-1: moderate: update for libXfont
-
http://osvdb.org/101842
-
http://secunia.com/advisories/56336
Sign in
-
http://secunia.com/advisories/56371
Sign in
-
http://secunia.com/advisories/56240
Sign inVendor Advisory
-
http://secunia.com/advisories/56357
Sign in
-
http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63
xorg/lib/libXfont - X font handling library for server & utilities (mirrored from https://gitlab.freedesktop.org/xorg/lib/libxfont)Exploit;Patch
-
http://seclists.org/oss-sec/2014/q1/33
oss-sec: Fwd: X.Org Security Advisory: CVE-2013-6462: Stack buffer overflow in parsing of BDF font files in libXfont
Jump to