{ "schema_version": "1.4.0", "id": "GHSA-7vj8-7ww8-h9v6", "modified": "2022-05-17T01:30:28Z", "published": "2022-05-17T01:30:28Z", "aliases": [ "CVE-2013-6462" ], "details": "Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6462" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90123" }, { "type": "WEB", "url": "http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html" }, { "type": "WEB", "url": "http://lists.x.org/archives/xorg-announce/2014-January/002389.html" }, { "type": "WEB", "url": "http://osvdb.org/101842" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0018.html" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2014/q1/33" }, { "type": "WEB", "url": "http://secunia.com/advisories/56240" }, { "type": "WEB", "url": "http://secunia.com/advisories/56336" }, { "type": "WEB", "url": "http://secunia.com/advisories/56357" }, { "type": "WEB", "url": "http://secunia.com/advisories/56371" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2838" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/64694" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2078-1" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-01-09T18:55:00Z" } }