[Bug 1191081] New: CVE-2014-9659 freetype: stack-based buffer overflow in cff/cf2intrp.c in the CFF CharString interpreter

bugzilla at redhat.com bugzilla at redhat.com
Tue Feb 10 12:50:27 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1191081

            Bug ID: 1191081
           Summary: CVE-2014-9659 freetype: stack-based buffer overflow in
                    cff/cf2intrp.c in the CFF CharString interpreter
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-team at redhat.com
          Reporter: vkaigoro at redhat.com
                CC: behdad at fedoraproject.org,
                    fonts-bugs at lists.fedoraproject.org,
                    kevin at tigcc.ticalc.org, mkasik at redhat.com



Common Vulnerabilities and Exposures assigned CVE-2014-9659 to the following
issue:

cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4
proceeds with additional hints after the hint mask has been computed, which
allows remote attackers to execute arbitrary code or cause a denial of service
(stack-based buffer overflow) via a crafted OpenType font.  NOTE: this
vulnerability exists because of an incomplete fix for CVE-2014-2240.

http://code.google.com/p/google-security-research/issues/detail?id=190
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2cdc4562f873237f1c77d43540537c7a721d3fd8

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=1BW2tI8gZz&a=cc_unsubscribe


More information about the fonts-bugs mailing list