CVE-2014-9666Integer Overflow or Wraparound in Freetype

Severity
6.8MEDIUMNVD
EPSS
1.4%
top 19.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8
Latest updateMay 14

Description

The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages8 packages

Debianfreetype/freetype< 2.5.2-3+3
NVDoracle/solaris10.0, 11.2+1
NVDopensuse/opensuse13.1, 13.2+1

Also affects: Debian Linux 7.0, Fedora 20, 21, Ubuntu Linux 10.04, 12.04, 14.04, 14.10, 15.04, Enterprise Linux 6.6.z, 7.1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rw4g-9pgq-p77v: The tt_sbit_decoder_init function in sfnt/ttsbit2022-05-14
CVEList
CVE-2014-9666: The tt_sbit_decoder_init function in sfnt/ttsbit2015-02-08
OSV
CVE-2014-9666: The tt_sbit_decoder_init function in sfnt/ttsbit2015-02-08

📋Vendor Advisories

3
Ubuntu
FreeType vulnerabilities2015-02-24
Red Hat
freetype: integer overflow in tt_sbit_decoder_init() leading to out-of-bounds read2014-11-24
Debian
CVE-2014-9666: freetype - The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proc...2014

💬Community

2
Bugzilla
CVE-2014-9656 CVE-2014-9657 CVE-2014-9661 CVE-2014-9660 CVE-2014-9667 CVE-2014-9666 CVE-2014-9665 CVE-2014-9664 CVE-2014-9669 CVE-2014-9668 CVE-2014-9662 CVE-2014-9658 CVE-2014-9659 CVE-2014-9663 CVE-2015-02-10
Bugzilla
CVE-2014-9666 freetype: integer overflow in tt_sbit_decoder_init() leading to out-of-bounds read2015-02-10
CVE-2014-9666 — Integer Overflow or Wraparound | cvebase