CVE-2007-1351
Summary
| CVE | CVE-2007-1351 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-04-06 01:19:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
SingleConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:M/Au:S/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Mandrakesoft | Mandrake Linux | 2007 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 2007 | All | x86_64 | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 3.0 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 3.0 | All | x86_64 | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 4.0 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 4.0 | All | x86_64 | All |
| Application | Mandrakesoft | Mandrake Multi Network Firewall | 2.0 | All | All | All |
| Operating System | Openbsd | Openbsd | 3.9 | All | All | All |
| Operating System | Openbsd | Openbsd | 4.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 2.1 | All | advanced_server | All |
| Operating System | Redhat | Enterprise Linux | 2.1 | All | advanced_server_ia64 | All |
| Operating System | Redhat | Enterprise Linux | 2.1 | All | enterprise_server | All |
| Operating System | Redhat | Enterprise Linux | 2.1 | All | enterprise_server_ia64 | All |
| Operating System | Redhat | Enterprise Linux | 2.1 | All | workstation | All |
| Operating System | Redhat | Enterprise Linux | 2.1 | All | workstation_ia64 | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | advanced_servers | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | enterprise_server | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | workstation | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | advanced_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | enterprise_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | workstation | All |
| Operating System | Redhat | Enterprise Linux | 5.0 | All | desktop | All |
| Operating System | Redhat | Enterprise Linux | 5.0 | All | desktop_workstation | All |
| Operating System | Redhat | Enterprise Linux | 5.0 | All | server | All |
| Operating System | Redhat | Enterprise Linux Desktop | 3.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 4.0 | All | All | All |
| Operating System | Redhat | Linux Advanced Workstation | 2.1 | All | ia64 | All |
| Operating System | Redhat | Linux Advanced Workstation | 2.1 | All | itanium | All |
| Operating System | Rpath | Rpath Linux | 1 | All | All | All |
| Operating System | Ubuntu | Ubuntu Linux | 5.10 | All | amd64 | All |
| Operating System | Ubuntu | Ubuntu Linux | 5.10 | All | i386 | All |
| Operating System | Ubuntu | Ubuntu Linux | 5.10 | All | powerpc | All |
| Operating System | Ubuntu | Ubuntu Linux | 5.10 | All | sparc | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.06_lts | All | amd64 | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.06_lts | All | i386 | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.06_lts | All | powerpc | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.06_lts | All | sparc | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.10 | All | amd64 | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.10 | All | i386 | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.10 | All | powerpc | All |
| Operating System | Ubuntu | Ubuntu Linux | 6.10 | All | sparc | All |
| Application | X.org | Libxfont | 1.2.2 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.3.0 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.3.0.1 | All | All | All |
| Application | Xfree86 Project | X11r6 | 4.3.0.2 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Support / Security / Advisories / / MDKSA-2007:079 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Avaya Products FreeType BDF Font Integer Overflow Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Mandriva update for tightvnc - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| ASA-2007-193 (RHSA-2007-0150) | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | |
| SecurityTracker.com Archives - X11 Overflows Let Local Users Gain Root Privileges | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| SUSE Update for Multiple Packages - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| OpenBSD update for X.Org - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Mandriva update for freetype2 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Debian -- Security Information -- DSA-1294-1 xfree86 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| #102886: Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1) | af854a3a-2127-422b-91ae-364da2661108 | sunsolve.sun.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | |
| rPath update for freetype, xorg-x11, xorg-x11-fonts, xorg-x11-tools, and xorg-x11-xfs - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SourceForge.net: Files | af854a3a-2127-422b-91ae-364da2661108 | sourceforge.net | |
| Gentoo update for freetype - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| issues.foresightlinux.org/browse/FL-223 | af854a3a-2127-422b-91ae-364da2661108 | issues.foresightlinux.org | |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | |
| FreeType BDF Font Integer Overflow Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Advisories - Mandriva Linux | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| labs.idefense.com/intelligence/vulnerabilities/display.php | af854a3a-2127-422b-91ae-364da2661108 | labs.idefense.com | Patch |
| ASA-2007-178 (SUN 102886) | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | |
| Page not found - SourceForge.net | af854a3a-2127-422b-91ae-364da2661108 | sourceforge.net | |
| Trustix update for freetype and clamav - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Red Hat update for freetype - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| [ANNOUNCE] various integer overflow vulnerabilites in xserver, libX11 and libXfont | af854a3a-2127-422b-91ae-364da2661108 | lists.freedesktop.org | |
| Red Hat update for XFree86 - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| X.Org LibXFont Multiple Local Integer Overflow Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch |
| ImageMagick XGetPixel/XInitImage Multiple Integer Overflow Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| SUSE update for XFree86 and Xorg - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Linux Terminal Server Project: Multiple vulnerabilities — Gentoo Linux Documentation | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| USN-448-1: X.org vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Webmail | OVH- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Support / Security / Advisories / / MDKSA-2007:080 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | |
| Slackware update for freetype - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| X.Org X11 Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Sun Solaris X11 Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Gentoo Linux Documentation -- LibXfont, TightVNC: Multiple vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| OpenBSD 3.9 errata | af854a3a-2127-422b-91ae-364da2661108 | www.openbsd.org | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| About the security content of Security Update 2009-001 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| Debian update for freetype - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Mandriva update for xorg-x11 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| www.trustix.org/errata/2007/0013 | af854a3a-2127-422b-91ae-364da2661108 | www.trustix.org | |
| Avaya CMS / IR X.Org X11 Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Debian update for xfree86 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| APPLE-SA-2009-02-12 Security Update 2009-001 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| Debian -- Security Information -- DSA-1454-1 freetype | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Red Hat update for xorg-x11 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| XFree86 Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| OpenBSD 4.0 errata | af854a3a-2127-422b-91ae-364da2661108 | www.openbsd.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Gentoo update for libXfont and tightvnc - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail | OVH- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Apple Mac OS X Security Update Fixes Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| APPLE-SA-2007-11-14 Safari 3 Beta Update 3.0.4 (Windows) | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| issues.rpath.com/browse/RPL-1213 | af854a3a-2127-422b-91ae-364da2661108 | issues.rpath.com | |
| Gentoo ltsp Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Gentoo Linux Documentation -- FreeType: User-assisted execution of arbitrary code | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| RETIRED: Freetype Font Files Integer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Ubuntu update for freetype, libxfont, xorg, and xorg-server - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.