The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html - | |
References | () http://savannah.nongnu.org/bugs/index.php?41590 - | |
References | () http://www.debian.org/security/2015/dsa-3370 - | |
References | () http://www.securityfocus.com/bid/76727 - | |
References | () http://www.securitytracker.com/id/1033536 - | |
References | () http://www.ubuntu.com/usn/USN-2739-1 - | |
References | () https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/1492124 - | |
References | () https://code.google.com/p/chromium/issues/detail?id=459050 - |
Information
Published : 2015-09-14 20:59
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9745
Mitre link : CVE-2014-9745
CVE.ORG link : CVE-2014-9745
JSON object : View
Products Affected
freetype
- freetype
opensuse
- opensuse
debian
- debian_linux
canonical
- ubuntu_linux
CWE
CWE-399
Resource Management Errors