Lucene search

K
f5F5F5:K52439336
HistorySep 06, 2016 - 12:00 a.m.

K52439336 : FreeType vulnerabilities CVE-2014-9746 and CVE-2014-9747

2016-09-0600:00:00
my.f5.com
13

9 High

AI Score

Confidence

High

0.025 Low

EPSS

Percentile

90.3%

Security Advisory Description

The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font.

The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font.

Impact

ARX

Parsing certain fonts from untrusted sources may allow the unauthorized disclosure of information or a denial-of-service (DoS) attack.

BIG-IP, BIG-IQ, Enterprise Manager, and F5 iWorkflow

These F5 products are not vulnerable in the default configurations, and there is no impact to these products.

LineRate and Traffix SDC

There is no impact; these F5 products are not affected by this vulnerability.

9 High

AI Score

Confidence

High

0.025 Low

EPSS

Percentile

90.3%