9.3
CVSSv2

CVE-2011-2895

Published: 19/08/2011 Updated: 29/08/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont prior to 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD prior to 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x prior to 5.0.3 and 5.1.x prior to 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent malicious users to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openbsd 3.5

openbsd openbsd 3.4

openbsd openbsd 3.3

openbsd openbsd 2.6

openbsd openbsd 2.0

freebsd freebsd

netbsd netbsd

openbsd openbsd 3.0

openbsd openbsd 2.9

openbsd openbsd 2.3

openbsd openbsd 2.4

x libxfont 1.2.0

x libxfont 1.2.1

x libxfont 1.2.9

x libxfont 1.3.0

x libxfont 1.4.2

openbsd openbsd 3.6

openbsd openbsd 2.8

openbsd openbsd 2.7

openbsd openbsd 2.5

openbsd openbsd

x libxfont 1.2.2

x libxfont 1.2.3

x libxfont 1.2.4

x libxfont 1.3.1

x libxfont 1.3.2

x libxfont 1.2.5

x libxfont 1.2.6

x libxfont 1.3.3

x libxfont 1.3.4

openbsd openbsd 3.2

openbsd openbsd 3.1

openbsd openbsd 2.1

openbsd openbsd 2.2

freetype freetype 2.1.9

x libxfont

x libxfont 1.2.7

x libxfont 1.2.8

x libxfont 1.4.0

x libxfont 1.4.1

Vendor Advisories

Synopsis Important: libXfont security update Type/Severity Security Advisory: Important Topic Updated libXfont packages that fix one security issue are now available forRed Hat Enterprise Linux 56 Extended Update SupportThe Red Hat Security Response Team has rated this update as havingimportant security i ...
libXfont could be made to run programs as an administrator if it opened a specially crafted file ...
Tomas Hoger found a buffer overflow in the XOrg libXfont library, which may allow for a local privilege escalation through crafted font files For the oldstable distribution (lenny), this problem has been fixed in version 133-2 For the stable distribution (squeeze), this problem has been fixed in version 141-3 For the unstable distribution ( ...

References

CWE-119http://www.ubuntu.com/usn/USN-1191-1http://lists.freedesktop.org/archives/xorg-announce/2011-August/001721.htmlhttp://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0https://bugzilla.redhat.com/show_bug.cgi?id=725760http://www.redhat.com/support/errata/RHSA-2011-1155.htmlhttp://secunia.com/advisories/45568http://www.openwall.com/lists/oss-security/2011/08/10/10http://securitytracker.com/id?1025920http://www.debian.org/security/2011/dsa-2293http://secunia.com/advisories/45544http://www.redhat.com/support/errata/RHSA-2011-1154.htmlhttp://www.securityfocus.com/bid/49124http://secunia.com/advisories/45599https://bugzilla.redhat.com/show_bug.cgi?id=727624http://lists.freedesktop.org/archives/xorg-announce/2011-August/001722.htmlhttp://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/compress/zopen.c#rev1.17http://www.redhat.com/support/errata/RHSA-2011-1161.htmlhttp://secunia.com/advisories/45986http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00019.htmlhttp://secunia.com/advisories/46127http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-007.txt.aschttp://www.mandriva.com/security/advisories?name=MDVSA-2011:153http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00004.htmlhttp://www.redhat.com/support/errata/RHSA-2011-1834.htmlhttp://lists.apple.com/archives/security-announce/2012/Feb/msg00000.htmlhttp://support.apple.com/kb/HT5130http://support.apple.com/kb/HT5281http://lists.apple.com/archives/security-announce/2012/May/msg00001.htmlhttp://secunia.com/advisories/48951https://support.apple.com/HT205635http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.htmlhttps://support.apple.com/HT205637http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.htmlhttp://lists.apple.com/archives/security-announce/2015/Dec/msg00000.htmlhttps://support.apple.com/HT205641http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.htmlhttps://support.apple.com/HT205640https://exchange.xforce.ibmcloud.com/vulnerabilities/69141https://access.redhat.com/errata/RHSA-2011:1834https://usn.ubuntu.com/1191-1/https://nvd.nist.gov