Описание
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 4 | freetype | Will not fix | ||
Red Hat Enterprise Linux 5 | freetype | Will not fix | ||
Red Hat Enterprise Virtualization 3 | mingw-virt-viewer | Affected | ||
Red Hat Enterprise Linux 6 | freetype | Fixed | RHSA-2015:0696 | 17.03.2015 |
Red Hat Enterprise Linux 7 | freetype | Fixed | RHSA-2015:0696 | 17.03.2015 |
Показывать по
Дополнительная информация
Статус:
2.6 Low
CVSS2
Связанные уязвимости
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType befor ...
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
2.6 Low
CVSS2