Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://savannah.nongnu.org/bugs/?41697 - | |
References | () http://secunia.com/advisories/57291 - Vendor Advisory | |
References | () http://secunia.com/advisories/57447 - | |
References | () http://sourceforge.net/projects/freetype/files/freetype2/2.5.3 - | |
References | () http://www.freetype.org/index.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/66074 - | |
References | () http://www.securitytracker.com/id/1029895 - | |
References | () http://www.ubuntu.com/usn/USN-2148-1 - |
Information
Published : 2014-03-12 14:55
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2240
Mitre link : CVE-2014-2240
CVE.ORG link : CVE-2014-2240
JSON object : View
Products Affected
freetype
- freetype
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer