Release date:
Updated on:
Affected Systems:
X.org LibXfont 1.4.3
X.org LibXfont 1.3.1
X.org LibXfont 1.2.2
X.org LibXfont 1.2.1
Description:
--------------------------------------------------------------------------------
Bugtraq id: 64694
CVE (CAN) ID: CVE-2013-6462
X. Org is the open-source implementation of X Window System by X. Org Foundation.
X. org libXfont does not correctly parse the boundaries of malicious files. The stack buffer overflow vulnerability exists in the implementation. Remote attackers can exploit this vulnerability to cause buffer overflow by sending specially crafted BDF files to the affected system, execute arbitrary code or cause application crash.
<* Source: Alan Coopersmith
Link: http://xforce.iss.net/xforce/xfdb/90123
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
X.org
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.x.org/wiki/Development/Security