MEDIUM · 5.0

CVE-2014-9745

The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as d...

Vulnerability Description

The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
FreetypeFreetype<= 2.5.2
DebianDebian Linux7.0
CanonicalUbuntu Linux12.04
OpensuseOpensuse13.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9745?

CVE-2014-9745 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as d...

How severe is CVE-2014-9745?

CVE-2014-9745 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9745?

Check the references section above for vendor advisories and patch information. Affected products include: Freetype Freetype, Debian Debian Linux, Canonical Ubuntu Linux, Opensuse Opensuse.