Oracle Linux 5 / 6 : libxfont (ELSA-2014-0018)

high Nessus Plugin ID 71908

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

From Red Hat Security Advisory 2014:0018 :

Updated libXfont packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The libXfont packages provide the X.Org libXfont runtime library.
X.Org is an open source implementation of the X Window System.

A stack-based buffer overflow flaw was found in the way the libXfont library parsed Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server.
(CVE-2013-6462)

Users of libXfont should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running X.Org server instances must be restarted for the update to take effect.

Solution

Update the affected libxfont packages.

See Also

https://oss.oracle.com/pipermail/el-errata/2014-January/003910.html

https://oss.oracle.com/pipermail/el-errata/2014-January/003911.html

Plugin Details

Severity: High

ID: 71908

File Name: oraclelinux_ELSA-2014-0018.nasl

Version: 1.12

Type: local

Agent: unix

Published: 1/12/2014

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:libxfont, p-cpe:/a:oracle:linux:libxfont-devel, cpe:/o:oracle:linux:5, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/10/2014

Vulnerability Publication Date: 1/9/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-6462

BID: 64694

RHSA: 2014:0018