Description
In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, insufficient validation of user-provided font parameters can result in an integer overflow, leading to the use of arbitrary kernel memory as glyph data. Unprivileged users may be able to access privileged kernel data.
Published: 2018-04-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-18661 In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, insufficient validation of user-provided font parameters can result in an integer overflow, leading to the use of arbitrary kernel memory as glyph data. Unprivileged users may be able to access privileged kernel data.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2024-09-17T01:51:49.786Z

Reserved: 2018-02-12T00:00:00.000Z

Link: CVE-2018-6917

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-04T14:29:00.247

Modified: 2024-11-21T04:11:25.203

Link: CVE-2018-6917

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses