CVE-2015-3905

t1utils <1.39 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Buffer overflow in the set_cs_start function in t1disasm.c in t1utils before 1.39 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

References (10)

Core 10
Core References
Various Sources x_refsource_confirm
https://github.com/kohler/t1utils/blob/master/NEWS
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/05/13/9
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/74674
Exploit x_refsource_confirm
https://github.com/kohler/t1utils/issues/4
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/05/22/10
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201507-10
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1218365
Various Sources vendor-advisory x_refsource_ubuntu
http://ubuntu.com/usn/usn-2627-1

Scores

EPSS 0.0471
EPSS Percentile 89.4%

Details

CWE
CWE-119
Status published
Products (3)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 14.10
t1utils_project/t1utils 1.38
Published Jun 08, 2015
Tracked Since Feb 18, 2026