Lucene search

K
debianDebianDEBIAN:DSA-2293-1:771F2
HistoryAug 12, 2011 - 2:15 p.m.

[SECURITY] [DSA 2293-1] libxfont security update

2011-08-1214:15:28
lists.debian.org
9

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.6 Medium

AI Score

Confidence

Low

0.013 Low

EPSS

Percentile

86.1%


Debian Security Advisory DSA-2293-1 [email protected]
http://www.debian.org/security/ Thijs Kinkhorst
August 12, 2011 http://www.debian.org/security/faq


Package : libxfont
Vulnerability : buffer overflow
Problem type : local
Debian-specific: no
CVE ID : CVE-2011-2895

Tomas Hoger found a buffer overflow in the X.Org libXfont library,
which may allow for a local privilege escalation through crafted
font files.

For the oldstable distribution (lenny), this problem has been fixed in
version 1.3.3-2.

For the stable distribution (squeeze), this problem has been fixed in
version 1.4.1-3.

For the unstable distribution (sid), this problem has been fixed in
version 1.4.4-1.

We recommend that you upgrade your libxfont packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.6 Medium

AI Score

Confidence

Low

0.013 Low

EPSS

Percentile

86.1%