MEDIUM · 6.8

CVE-2014-9666

The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a deni...

Vulnerability Description

The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
OpensuseOpensuse13.1
OracleSolaris10.0
CanonicalUbuntu Linux10.04
DebianDebian Linux7.0
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Hpc Node6
RedhatEnterprise Linux Hpc Node Eus7.1
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Eus6.6.z
RedhatEnterprise Linux Workstation6.0
FedoraprojectFedora20
FreetypeFreetype<= 2.5.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9666?

CVE-2014-9666 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a deni...

How severe is CVE-2014-9666?

CVE-2014-9666 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9666?

Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Oracle Solaris, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Enterprise Linux Desktop.