In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.1"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "1.5.2"
}
]
}