CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
95.1%
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
Vendor | Product | Version | CPE |
---|---|---|---|
freetype | freetype | 2.1.9 | cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:* |
x | libxfont | * | cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:* |
x | libxfont | 1.2.0 | cpe:2.3:a:x:libxfont:1.2.0:*:*:*:*:*:*:* |
x | libxfont | 1.2.1 | cpe:2.3:a:x:libxfont:1.2.1:*:*:*:*:*:*:* |
x | libxfont | 1.2.2 | cpe:2.3:a:x:libxfont:1.2.2:*:*:*:*:*:*:* |
x | libxfont | 1.2.3 | cpe:2.3:a:x:libxfont:1.2.3:*:*:*:*:*:*:* |
x | libxfont | 1.2.4 | cpe:2.3:a:x:libxfont:1.2.4:*:*:*:*:*:*:* |
x | libxfont | 1.2.5 | cpe:2.3:a:x:libxfont:1.2.5:*:*:*:*:*:*:* |
x | libxfont | 1.2.6 | cpe:2.3:a:x:libxfont:1.2.6:*:*:*:*:*:*:* |
x | libxfont | 1.2.7 | cpe:2.3:a:x:libxfont:1.2.7:*:*:*:*:*:*:* |
cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-007.txt.asc
lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
lists.apple.com/archives/security-announce/2012/May/msg00001.html
lists.apple.com/archives/security-announce/2015/Dec/msg00000.html
lists.apple.com/archives/security-announce/2015/Dec/msg00001.html
lists.apple.com/archives/security-announce/2015/Dec/msg00002.html
lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
lists.freedesktop.org/archives/xorg-announce/2011-August/001721.html
lists.freedesktop.org/archives/xorg-announce/2011-August/001722.html
lists.opensuse.org/opensuse-security-announce/2011-09/msg00019.html
lists.opensuse.org/opensuse-security-announce/2011-12/msg00004.html
secunia.com/advisories/45544
secunia.com/advisories/45568
secunia.com/advisories/45599
secunia.com/advisories/45986
secunia.com/advisories/46127
secunia.com/advisories/48951
securitytracker.com/id?1025920
support.apple.com/kb/HT5130
support.apple.com/kb/HT5281
www.debian.org/security/2011/dsa-2293
www.mandriva.com/security/advisories?name=MDVSA-2011:153
www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/compress/zopen.c#rev1.17
www.openwall.com/lists/oss-security/2011/08/10/10
www.redhat.com/support/errata/RHSA-2011-1154.html
www.redhat.com/support/errata/RHSA-2011-1155.html
www.redhat.com/support/errata/RHSA-2011-1161.html
www.redhat.com/support/errata/RHSA-2011-1834.html
www.securityfocus.com/bid/49124
www.ubuntu.com/usn/USN-1191-1
bugzilla.redhat.com/show_bug.cgi?id=725760
bugzilla.redhat.com/show_bug.cgi?id=727624
exchange.xforce.ibmcloud.com/vulnerabilities/69141
support.apple.com/HT205635
support.apple.com/HT205637
support.apple.com/HT205640
support.apple.com/HT205641