Buffer overflow in the set_cs_start function in t1disasm.c in t1utils before 1.39 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
References
Configurations
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://ubuntu.com/usn/usn-2627-1 - | |
References | () http://www.openwall.com/lists/oss-security/2015/05/13/9 - | |
References | () http://www.openwall.com/lists/oss-security/2015/05/22/10 - | |
References | () http://www.securityfocus.com/bid/74674 - | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779274 - Exploit | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1218365 - | |
References | () https://github.com/kohler/t1utils/blob/master/NEWS - | |
References | () https://github.com/kohler/t1utils/commit/6b9d1aafcb61a3663c883663eb19ccdbfcde8d33 - | |
References | () https://github.com/kohler/t1utils/issues/4 - Exploit | |
References | () https://security.gentoo.org/glsa/201507-10 - |
Information
Published : 2015-06-08 14:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-3905
Mitre link : CVE-2015-3905
CVE.ORG link : CVE-2015-3905
JSON object : View
Products Affected
t1utils_project
- t1utils
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer