In the PatternMatch function in fontfile/fontdir.c in libXfont up to and including 1.5.2 and 2.x prior to 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
x.org libxfont 2.0.0 |
||
x.org libxfont 2.0.1 |
||
x.org libxfont |