CVE-2014-9666 — Integer Overflow or Wraparound in Freetype
Severity
6.8MEDIUMNVD
EPSS
1.4%
top 19.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 8
Latest updateMay 14
Description
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages8 packages
Also affects: Debian Linux 7.0, Fedora 20, 21, Ubuntu Linux 10.04, 12.04, 14.04, 14.10, 15.04, Enterprise Linux 6.6.z, 7.1
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3💬Community
2Bugzilla▶
CVE-2014-9656 CVE-2014-9657 CVE-2014-9661 CVE-2014-9660 CVE-2014-9667 CVE-2014-9666 CVE-2014-9665 CVE-2014-9664 CVE-2014-9669 CVE-2014-9668 CVE-2014-9662 CVE-2014-9658 CVE-2014-9659 CVE-2014-9663 CVE-↗2015-02-10
Bugzilla▶
CVE-2014-9666 freetype: integer overflow in tt_sbit_decoder_init() leading to out-of-bounds read↗2015-02-10