1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
|
PublicDateAtUSN: 2015-02-08
Candidate: CVE-2014-9666
PublicDate: 2015-02-08
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
http://www.ubuntu.com/usn/usn-2510-1
Description:
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4
proceeds with a count-to-size association without restricting the count
value, which allows remote attackers to cause a denial of service (integer
overflow and out-of-bounds read) or possibly have unspecified other impact
via a crafted embedded bitmap.
Ubuntu-Description:
Notes:
mdeslaur> in precise, this is in src/sfnt/ttsbit0.c
Bugs:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
http://savannah.nongnu.org/bugs/?43591
http://code.google.com/p/google-security-research/issues/detail?id=167
Priority: medium
Discovered-by: Mateusz Jurczyk
Assigned-to: mdeslaur
Patches_freetype:
upstream: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439
upstream_freetype: released (2.5.4)
lucid_freetype: released (2.3.11-1ubuntu2.8)
precise_freetype: released (2.4.8-1ubuntu2.2)
trusty_freetype: released (2.5.2-1ubuntu2.4)
utopic_freetype: released (2.5.2-2ubuntu1.1)
devel_freetype: released (2.5.2-2ubuntu3)
|