CVE-2014-9667 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Freetype
Severity
6.8MEDIUMNVD
EPSS
2.0%
top 16.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 8
Latest updateMay 14
Description
sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages7 packages
Also affects: Debian Linux 7.0, Fedora 20, 21, Ubuntu Linux 10.04, 12.04, 14.04, 14.10, 15.04, Enterprise Linux 6.6.z, 7.1
🔴Vulnerability Details
3📋Vendor Advisories
3💬Community
2Bugzilla▶
CVE-2014-9656 CVE-2014-9657 CVE-2014-9661 CVE-2014-9660 CVE-2014-9667 CVE-2014-9666 CVE-2014-9665 CVE-2014-9664 CVE-2014-9669 CVE-2014-9668 CVE-2014-9662 CVE-2014-9658 CVE-2014-9659 CVE-2014-9663 CVE-↗2015-02-10
Bugzilla▶
CVE-2014-9667 freetype: integer overflow in tt_face_load_font_dir() leading to out-of-bounds read↗2015-02-10