First published: Tue Jun 07 2016(Updated: )
The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <=2.5.3 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9746 is classified as a moderate severity vulnerability due to insufficient checks in FreeType's font parsing functions.
To fix CVE-2014-9746, upgrade FreeType to version 2.5.4 or later, where the vulnerability has been addressed.
CVE-2014-9746 affects FreeType versions up to and including 2.5.3 and Debian Linux versions 7.0 and 8.0.
CVE-2014-9746 allows attackers to exploit font parsing vulnerabilities to execute arbitrary code or cause application crashes.
Users and applications that rely on vulnerable versions of FreeType for font rendering are primarily impacted by CVE-2014-9746.