First published: Thu Feb 26 2015(Updated: )
Buffer overflow in the set_cs_start function in t1disasm.c in t1utils before 1.39 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/t1utils | <=1.37-1<=1.38-3 | 1.39-1 1.38-4 |
redhat/t1utils | <1.39 | 1.39 |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
T1utils Project T1utils | =1.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.