Описание
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.5.2-2ubuntu3 |
| esm-infra-legacy/trusty | released | 2.5.2-1ubuntu2.4 |
| lucid | released | 2.3.11-1ubuntu2.8 |
| precise | released | 2.4.8-1ubuntu2.2 |
| trusty | released | 2.5.2-1ubuntu2.4 |
| trusty/esm | released | 2.5.2-1ubuntu2.4 |
| upstream | released | 2.5.4 |
| utopic | released | 2.5.2-2ubuntu1.1 |
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before ...
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
6.8 Medium
CVSS2