First published: Thu May 15 2014(Updated: )
Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
Red Hat Libxfont | <=1.4.7 | |
Red Hat Libxfont | =1.2.3 | |
Red Hat Libxfont | =1.2.4 | |
Red Hat Libxfont | =1.2.5 | |
Red Hat Libxfont | =1.2.6 | |
Red Hat Libxfont | =1.2.7 | |
Red Hat Libxfont | =1.2.8 | |
Red Hat Libxfont | =1.2.9 | |
Red Hat Libxfont | =1.3.0 | |
Red Hat Libxfont | =1.3.1 | |
Red Hat Libxfont | =1.3.2 | |
Red Hat Libxfont | =1.3.3 | |
Red Hat Libxfont | =1.3.4 | |
Red Hat Libxfont | =1.4.0 | |
Red Hat Libxfont | =1.4.1 | |
Red Hat Libxfont | =1.4.2 | |
Red Hat Libxfont | =1.4.3 | |
Red Hat Libxfont | =1.4.4 | |
Red Hat Libxfont | =1.4.5 | |
Red Hat Libxfont | =1.4.6 | |
Red Hat Libxfont | =1.4.99 | |
=10.04 | ||
=12.04 | ||
=12.10 | ||
=13.10 | ||
=14.04 | ||
<=1.4.7 | ||
=1.2.3 | ||
=1.2.4 | ||
=1.2.5 | ||
=1.2.6 | ||
=1.2.7 | ||
=1.2.8 | ||
=1.2.9 | ||
=1.3.0 | ||
=1.3.1 | ||
=1.3.2 | ||
=1.3.3 | ||
=1.3.4 | ||
=1.4.0 | ||
=1.4.1 | ||
=1.4.2 | ||
=1.4.3 | ||
=1.4.4 | ||
=1.4.5 | ||
=1.4.6 | ||
=1.4.99 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0211 has a high severity rating due to its potential for remote code execution through crafted font server replies.
To fix CVE-2014-0211, upgrade to libXfont version 1.4.8 or later.
CVE-2014-0211 affects X.Org libXfont versions prior to 1.4.8 and various Ubuntu Linux distributions including versions 10.04 to 14.04.
Applications that utilize X.Org libXfont for font rendering are at risk from CVE-2014-0211.
Yes, CVE-2014-0211 can be exploited remotely via crafted replies from vulnerable font servers.