[Bug 1191087] New: CVE-2014-9665 freetype: integer overflow and heap-based buffer overflow in the Load_SBit_Png function in sfnt/pngshim.c
bugzilla at redhat.com
bugzilla at redhat.com
Tue Feb 10 12:51:30 UTC 2015
https://bugzilla.redhat.com/show_bug.cgi?id=1191087
Bug ID: 1191087
Summary: CVE-2014-9665 freetype: integer overflow and
heap-based buffer overflow in the Load_SBit_Png
function in sfnt/pngshim.c
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team at redhat.com
Reporter: vkaigoro at redhat.com
CC: behdad at fedoraproject.org,
fonts-bugs at lists.fedoraproject.org,
kevin at tigcc.ticalc.org, mkasik at redhat.com
Common Vulnerabilities and Exposures assigned CVE-2014-9665 to the following
issue:
The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not
restrict the rows and pitch values of PNG data, which allows remote attackers
to
cause a denial of service (integer overflow and heap-based buffer overflow) or
possibly have unspecified other impact by embedding a PNG file in a .ttf font
file.
http://code.google.com/p/google-security-research/issues/detail?id=168
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=54abd22891bd51ef8b533b24df53b3019b5cee81
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b3500af717010137046ec4076d1e1c0641e33727
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=pz7fNaoVKR&a=cc_unsubscribe
More information about the fonts-bugs
mailing list