First published: Sun Feb 08 2015(Updated: )
bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
FreeType | <=2.5.3 | |
Debian | =7.0 | |
Fedora | =20 | |
Fedora | =21 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.1 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =6.6.z | |
Red Hat Enterprise Linux Server | =7.1 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9675 is considered a high severity vulnerability due to its potential to allow remote attackers to bypass ASLR and exploit heap memory.
To fix CVE-2014-9675, users should upgrade FreeType to version 2.5.4 or later, or apply relevant patches provided by their operating system vendor.
CVE-2014-9675 affects multiple systems including various versions of FreeType and operating systems like Ubuntu, Debian, Fedora, and Red Hat Enterprise Linux.
Yes, CVE-2014-9675 can be exploited remotely by attackers using specially crafted BDF fonts.
CVE-2014-9675 could allow attackers to discover heap pointer values, leading to potential arbitrary code execution and compromise of application security.