National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2015-1803 Detail

Description

The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.

Source:  MITRE      Last Modified:  03/20/2015

Evaluator Description

CWE-476: NULL Pointer Dereference

Quick Info

CVE Dictionary Entry:
CVE-2015-1803
Original release date:
03/20/2015
Last revised:
12/30/2016
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
8.5 HIGH
Vector:
(AV:N/AC:M/Au:S/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
6.8
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://advisories.mageia.org/MGASA-2015-0113.html External Source CONFIRM http://advisories.mageia.org/MGASA-2015-0113.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152497.html External Source FEDORA FEDORA-2015-4199
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152838.html External Source FEDORA FEDORA-2015-4230
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html External Source SUSE openSUSE-SU-2015:0614
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html External Source SUSE SUSE-SU-2015:0674
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html External Source SUSE SUSE-SU-2015:0702
http://rhn.redhat.com/errata/RHSA-2015-1708.html External Source REDHAT RHSA-2015:1708
http://www.debian.org/security/2015/dsa-3194 External Source DEBIAN DSA-3194
http://www.mandriva.com/security/advisories?name=MDVSA-2015:145 External Source MANDRIVA MDVSA-2015:145
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html External Source CONFIRM http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73280 External Source BID 73280
http://www.securitytracker.com/id/1031935 External Source SECTRACK 1031935
http://www.ubuntu.com/usn/USN-2536-1 External Source UBUNTU USN-2536-1
http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/ Vendor Advisory External Source MISC http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/
https://security.gentoo.org/glsa/201507-21 External Source GENTOO GLSA-201507-21

Technical Details

Vulnerability Type (View All)

Change History 13 change records found - show changes