First published: Wed Oct 11 2017(Updated: )
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org LibXfont | <=1.5.2 | |
X.Org LibXfont | =2.0.0 | |
X.Org LibXfont | =2.0.1 |
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13720 has a severity rating that indicates it can lead to information disclosure or a denial of service.
To fix CVE-2017-13720, upgrade to libXfont version 2.0.2 or later.
CVE-2017-13720 affects users of libXfont versions up to 1.5.2 and specific versions 2.0.0 and 2.0.1.
CVE-2017-13720 is a buffer over-read vulnerability that could allow an attacker to exploit information disclosure.
CVE-2017-13720 involves the PatternMatch function in fontfile/fontdir.c of the libXfont library.