Unrated severityNVD Advisory· Published Apr 6, 2007· Updated Apr 23, 2026
CVE-2007-1351
CVE-2007-1351
Description
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
Affected products
39- cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*+ 14 more
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*+ 11 more
- cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
- cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
68- labs.idefense.com/intelligence/vulnerabilities/display.phpnvdPatch
- www.securityfocus.com/bid/23283nvdPatch
- secunia.com/advisories/24741nvdVendor Advisory
- secunia.com/advisories/24770nvdVendor Advisory
- issues.foresightlinux.org/browse/FL-223nvd
- lists.apple.com/archives/Security-announce/2007/Nov/msg00003.htmlnvd
- lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlnvd
- lists.freedesktop.org/archives/xorg-announce/2007-April/000286.htmlnvd
- rhn.redhat.com/errata/RHSA-2007-0125.htmlnvd
- secunia.com/advisories/24745nvd
- secunia.com/advisories/24756nvd
- secunia.com/advisories/24758nvd
- secunia.com/advisories/24765nvd
- secunia.com/advisories/24768nvd
- secunia.com/advisories/24771nvd
- secunia.com/advisories/24772nvd
- secunia.com/advisories/24776nvd
- secunia.com/advisories/24791nvd
- secunia.com/advisories/24885nvd
- secunia.com/advisories/24889nvd
- secunia.com/advisories/24921nvd
- secunia.com/advisories/24996nvd
- secunia.com/advisories/25004nvd
- secunia.com/advisories/25006nvd
- secunia.com/advisories/25096nvd
- secunia.com/advisories/25195nvd
- secunia.com/advisories/25216nvd
- secunia.com/advisories/25305nvd
- secunia.com/advisories/25495nvd
- secunia.com/advisories/28333nvd
- secunia.com/advisories/30161nvd
- secunia.com/advisories/33937nvd
- security.gentoo.org/glsa/glsa-200705-02.xmlnvd
- security.gentoo.org/glsa/glsa-200705-10.xmlnvd
- slackware.com/security/viewer.phpnvd
- sourceforge.net/project/shownotes.phpnvd
- sourceforge.net/project/shownotes.phpnvd
- sunsolve.sun.com/search/document.donvd
- support.apple.com/kb/HT3438nvd
- support.avaya.com/elmodocs2/security/ASA-2007-178.htmnvd
- support.avaya.com/elmodocs2/security/ASA-2007-193.htmnvd
- www.debian.org/security/2007/dsa-1294nvd
- www.debian.org/security/2008/dsa-1454nvd
- www.gentoo.org/security/en/glsa/glsa-200805-07.xmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2007_27_x.htmlnvd
- www.novell.com/linux/security/advisories/2007_6_sr.htmlnvd
- www.openbsd.org/errata39.htmlnvd
- www.openbsd.org/errata40.htmlnvd
- www.redhat.com/support/errata/RHSA-2007-0126.htmlnvd
- www.redhat.com/support/errata/RHSA-2007-0132.htmlnvd
- www.redhat.com/support/errata/RHSA-2007-0150.htmlnvd
- www.securityfocus.com/archive/1/464686/100/0/threadednvd
- www.securityfocus.com/archive/1/464816/100/0/threadednvd
- www.securityfocus.com/bid/23300nvd
- www.securityfocus.com/bid/23402nvd
- www.securitytracker.com/idnvd
- www.trustix.org/errata/2007/0013/nvd
- www.ubuntu.com/usn/usn-448-1nvd
- www.vupen.com/english/advisories/2007/1217nvd
- www.vupen.com/english/advisories/2007/1264nvd
- www.vupen.com/english/advisories/2007/1548nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/33417nvd
- issues.rpath.com/browse/RPL-1213nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810nvd
News mentions
0No linked articles in our index yet.