CVE-2014-9673Improper Restriction of Operations within the Bounds of a Memory Buffer in Freetype

Severity
6.8MEDIUMNVD
EPSS
4.2%
top 11.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8
Latest updateMay 14

Description

Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages7 packages

Debianfreetype/freetype< 2.5.2-3+3
NVDopensuse/opensuse13.1, 13.2+1

Also affects: Debian Linux 7.0, Ubuntu Linux 10.04, 12.04, 14.04, 14.10, 15.04, Enterprise Linux 6.6.z, 7.1

🔴Vulnerability Details

3
GHSA
GHSA-wxxh-vvrp-x25f: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs2022-05-14
CVEList
CVE-2014-9673: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs2015-02-08
OSV
CVE-2014-9673: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs2015-02-08

📋Vendor Advisories

3
Ubuntu
FreeType vulnerabilities2015-02-24
Red Hat
freetype: integer signedness error in Mac_Read_POST_Resource() leading to heap-based buffer overflow2014-11-24
Debian
CVE-2014-9673: freetype - Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c...2014

💬Community

1
Bugzilla
CVE-2014-9673 freetype: integer signedness error in Mac_Read_POST_Resource() leading to heap-based buffer overflow2015-02-10
CVE-2014-9673 — Freetype vulnerability | cvebase