[Bug 1191089] New: CVE-2014-9666 freetype: integer overflow and out-of-bounds read in the tt_sbit_decoder_init function in sfnt/ttsbit.c

bugzilla at redhat.com bugzilla at redhat.com
Tue Feb 10 12:51:41 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1191089

            Bug ID: 1191089
           Summary: CVE-2014-9666 freetype: integer overflow and
                    out-of-bounds read in the tt_sbit_decoder_init
                    function in sfnt/ttsbit.c
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-team at redhat.com
          Reporter: vkaigoro at redhat.com
                CC: behdad at fedoraproject.org,
                    fonts-bugs at lists.fedoraproject.org,
                    kevin at tigcc.ticalc.org, mkasik at redhat.com



Common Vulnerabilities and Exposures assigned CVE-2014-9666 to the following
issue:

The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4
proceeds with a count-to-size association without restricting the count value,
which allows remote attackers to cause a denial of service (integer overflow
and
out-of-bounds read) or possibly have unspecified other impact via a crafted
embedded bitmap.

http://code.google.com/p/google-security-research/issues/detail?id=167
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=J9m1YcGuZW&a=cc_unsubscribe


More information about the fonts-bugs mailing list