HIGH · 7.5

CVE-2014-9658

The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or ...

Vulnerability Description

The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
OracleSolaris10.0
CanonicalUbuntu Linux10.04
FedoraprojectFedora20
FreetypeFreetype<= 2.5.3
DebianDebian Linux7.0
OpensuseOpensuse13.1
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Hpc Node6
RedhatEnterprise Linux Hpc Node Eus7.1
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Eus6.6.z
RedhatEnterprise Linux Workstation6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9658?

CVE-2014-9658 is a vulnerability with a CVSS score of 7.5 (HIGH). The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or ...

How severe is CVE-2014-9658?

CVE-2014-9658 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9658?

Check the references section above for vendor advisories and patch information. Affected products include: Oracle Solaris, Canonical Ubuntu Linux, Fedoraproject Fedora, Freetype Freetype, Debian Debian Linux.