← Voltar para CVEs
CVE-2014-9661
N/ADescricao
type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado2/8/2015
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedorafreetype:freetypeopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_hpc_noderedhat:enterprise_linux_hpc_node_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstation
Referencias
http://advisories.mageia.org/MGASA-2015-0083.html(cve@mitre.org)
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3788187e0c396952cd7d905c6c61f3ff8e84b2b4(cve@mitre.org)
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=42fcd6693ec7bd6ffc65ddc63e74287a65dda669(cve@mitre.org)
http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-0696.html(cve@mitre.org)
http://www.debian.org/security/2015/dsa-3188(cve@mitre.org)
http://www.securityfocus.com/bid/72986(cve@mitre.org)
http://www.ubuntu.com/usn/USN-2510-1(cve@mitre.org)
http://www.ubuntu.com/usn/USN-2739-1(cve@mitre.org)
https://security.gentoo.org/glsa/201503-05(cve@mitre.org)
http://advisories.mageia.org/MGASA-2015-0083.html(af854a3a-2127-422b-91ae-364da2661108)
http://code.google.com/p/google-security-research/issues/detail?id=187(af854a3a-2127-422b-91ae-364da2661108)
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3788187e0c396952cd7d905c6c61f3ff8e84b2b4(af854a3a-2127-422b-91ae-364da2661108)
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=42fcd6693ec7bd6ffc65ddc63e74287a65dda669(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-0696.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2015/dsa-3188(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2015:055(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/72986(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2510-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2739-1(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201503-05(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.