CVE-2014-2240

Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.5.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:05

Type Values Removed Values Added
References () http://savannah.nongnu.org/bugs/?41697 - () http://savannah.nongnu.org/bugs/?41697 -
References () http://secunia.com/advisories/57291 - Vendor Advisory () http://secunia.com/advisories/57291 - Vendor Advisory
References () http://secunia.com/advisories/57447 - () http://secunia.com/advisories/57447 -
References () http://sourceforge.net/projects/freetype/files/freetype2/2.5.3 - () http://sourceforge.net/projects/freetype/files/freetype2/2.5.3 -
References () http://www.freetype.org/index.html - Patch, Vendor Advisory () http://www.freetype.org/index.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/66074 - () http://www.securityfocus.com/bid/66074 -
References () http://www.securitytracker.com/id/1029895 - () http://www.securitytracker.com/id/1029895 -
References () http://www.ubuntu.com/usn/USN-2148-1 - () http://www.ubuntu.com/usn/USN-2148-1 -

Information

Published : 2014-03-12 14:55

Updated : 2024-11-21 02:05


NVD link : CVE-2014-2240

Mitre link : CVE-2014-2240

CVE.ORG link : CVE-2014-2240


JSON object : View

Products Affected

freetype

  • freetype
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer