{"id":"CVE-2017-13722","details":"In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server.","modified":"2026-04-16T01:44:09.047722733Z","published":"2017-10-11T17:29:00.350Z","related":["SUSE-SU-2018:0246-1","SUSE-SU-2018:0334-1","openSUSE-SU-2024:10921-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"2.0.0"}],"cpe":"cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"2.0.1"}],"cpe":"cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3995"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201711-08"},{"type":"ADVISORY","url":"https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500693"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1049692"},{"type":"FIX","url":"https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=672bb944311392e2415b39c0d63b1e1902905bcd"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libXfont","events":[{"introduced":"0"},{"last_affected":"8cce9834b2e74dccad94ca0adf79ae5585e37d48"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.5.2"}],"cpe":"cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*"}}],"versions":["MODULAR_COPY","PRE_xf86-4_3_0_1","XACE-SELINUX-MERGE","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_901","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_7_99_904","XORG-6_8_0","XORG-6_8_1","XORG-6_8_1_901","XORG-6_8_1_902","XORG-6_8_99_1","XORG-6_8_99_10","XORG-6_8_99_11","XORG-6_8_99_12","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_16","XORG-6_8_99_2","XORG-6_8_99_3","XORG-6_8_99_4","XORG-6_8_99_5","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_8","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-7_0","XORG-7_0_99_901","XORG-7_1","XORG-MAIN","lg3d-base","lg3d-rel-0-7-0","libXfont-1.2.0","libXfont-1.2.3","libXfont-1.2.4","libXfont-1.2.5","libXfont-1.2.6","libXfont-1.2.7","libXfont-1.2.8","libXfont-1.2.9","libXfont-1.3.0","libXfont-1.3.1","libXfont-1.3.2","libXfont-1.3.3","libXfont-1.3.4","libXfont-1.4.0","libXfont-1.4.1","libXfont-1.4.2","libXfont-1.4.3","libXfont-1.4.4","libXfont-1.4.5","libXfont-1.4.6","libXfont-1.4.7","libXfont-1.4.99.901","libXfont-1.5.0","libXfont-1.5.1","libXfont-1.5.2","libxfont-1_1_0","rel-0-6-1","sco_port_update-base","xf86-012804-2330","xf86-4_3_0_1","xf86-4_3_99_16","xf86-4_3_99_901","xf86-4_3_99_902","xf86-4_3_99_903","xf86-4_3_99_903_special","xf86-4_4_0","xf86-4_4_99_1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-13722.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}