[Bug 1191087] New: CVE-2014-9665 freetype: integer overflow and heap-based buffer overflow in the Load_SBit_Png function in sfnt/pngshim.c

bugzilla at redhat.com bugzilla at redhat.com
Tue Feb 10 12:51:30 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1191087

            Bug ID: 1191087
           Summary: CVE-2014-9665 freetype: integer overflow and
                    heap-based buffer overflow in the Load_SBit_Png
                    function in sfnt/pngshim.c
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-team at redhat.com
          Reporter: vkaigoro at redhat.com
                CC: behdad at fedoraproject.org,
                    fonts-bugs at lists.fedoraproject.org,
                    kevin at tigcc.ticalc.org, mkasik at redhat.com



Common Vulnerabilities and Exposures assigned CVE-2014-9665 to the following
issue:

The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not
restrict the rows and pitch values of PNG data, which allows remote attackers
to
cause a denial of service (integer overflow and heap-based buffer overflow) or
possibly have unspecified other impact by embedding a PNG file in a .ttf font
file.

http://code.google.com/p/google-security-research/issues/detail?id=168
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=54abd22891bd51ef8b533b24df53b3019b5cee81
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b3500af717010137046ec4076d1e1c0641e33727

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=pz7fNaoVKR&a=cc_unsubscribe


More information about the fonts-bugs mailing list