First published: Mon Sep 14 2015(Updated: )
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <=2.5.2 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
SUSE Linux | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9745 has a high severity rating due to its potential for denial of service through an infinite loop.
To fix CVE-2014-9745, update FreeType to version 2.5.3 or higher.
CVE-2014-9745 affects FreeType versions prior to 2.5.3 and several specific distributions of Debian and Ubuntu Linux.
Yes, CVE-2014-9745 can be exploited remotely via a malformed Postscript stream.
CVE-2014-9745 is associated with denial of service attacks caused by an infinite loop.