CVE-2014-9666

NameCVE-2014-9666
DescriptionThe tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-185-1, DSA-3188-1
NVD severitymedium
Debian Bugs777656

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freetype (PTS)stretch2.6.3-3.2+deb9u1fixed
buster2.9.1-3+deb10u1fixed
buster (security)2.9.1-3+deb10u2fixed
bullseye2.10.2+dfsg-3fixed
sid2.10.2+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freetypesourcesqueeze2.4.2-2.1+squeeze5DLA-185-1
freetypesourcewheezy2.4.9-1.1+deb7u1DSA-3188-1
freetypesource(unstable)2.5.2-3777656

Notes

http://code.google.com/p/google-security-research/issues/detail?id=167
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439

Search for package or bug name: Reporting problems