HIGH · 7.5

CVE-2014-9663

The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a d...

Vulnerability Description

The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
FreetypeFreetype<= 2.5.3
DebianDebian Linux7.0
OpensuseOpensuse13.1
FedoraprojectFedora20
OracleSolaris10.0
CanonicalUbuntu Linux10.04
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Hpc Node6
RedhatEnterprise Linux Hpc Node Eus7.1
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Eus6.6.z
RedhatEnterprise Linux Workstation6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9663?

CVE-2014-9663 is a vulnerability with a CVSS score of 7.5 (HIGH). The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a d...

How severe is CVE-2014-9663?

CVE-2014-9663 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9663?

Check the references section above for vendor advisories and patch information. Affected products include: Freetype Freetype, Debian Debian Linux, Opensuse Opensuse, Fedoraproject Fedora, Oracle Solaris.