[Bug 1191081] New: CVE-2014-9659 freetype: stack-based buffer overflow in cff/cf2intrp.c in the CFF CharString interpreter
bugzilla at redhat.com
bugzilla at redhat.com
Tue Feb 10 12:50:27 UTC 2015
https://bugzilla.redhat.com/show_bug.cgi?id=1191081
Bug ID: 1191081
Summary: CVE-2014-9659 freetype: stack-based buffer overflow in
cff/cf2intrp.c in the CFF CharString interpreter
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team at redhat.com
Reporter: vkaigoro at redhat.com
CC: behdad at fedoraproject.org,
fonts-bugs at lists.fedoraproject.org,
kevin at tigcc.ticalc.org, mkasik at redhat.com
Common Vulnerabilities and Exposures assigned CVE-2014-9659 to the following
issue:
cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4
proceeds with additional hints after the hint mask has been computed, which
allows remote attackers to execute arbitrary code or cause a denial of service
(stack-based buffer overflow) via a crafted OpenType font. NOTE: this
vulnerability exists because of an incomplete fix for CVE-2014-2240.
http://code.google.com/p/google-security-research/issues/detail?id=190
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2cdc4562f873237f1c77d43540537c7a721d3fd8
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=1BW2tI8gZz&a=cc_unsubscribe
More information about the fonts-bugs
mailing list