Описание
The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.5.2-2ubuntu3 |
| esm-infra-legacy/trusty | released | 2.5.2-1ubuntu2.4 |
| lucid | not-affected | code not present |
| precise | not-affected | code not present |
| trusty | released | 2.5.2-1ubuntu2.4 |
| trusty/esm | released | 2.5.2-1ubuntu2.4 |
| upstream | released | 2.5.4 |
| utopic | released | 2.5.2-2ubuntu1.1 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 ...
The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
EPSS
7.5 High
CVSS2