#VU32478 Stack-based buffer overflow in FreeType - CVE-2014-2240
Published: March 12, 2014 / Updated: July 28, 2020
FreeType
freetype.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the cf2_hintmap_build function in cff/cf2hints.c when processing a large number of stem hints in a font file. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://savannah.nongnu.org/bugs/?41697
- http://secunia.com/advisories/57291
- http://secunia.com/advisories/57447
- http://sourceforge.net/projects/freetype/files/freetype2/2.5.3
- http://www.freetype.org/index.html
- http://www.securityfocus.com/bid/66074
- http://www.securitytracker.com/id/1029895
- http://www.ubuntu.com/usn/USN-2148-1