Description
Buffer overflow in the set_cs_start function in t1disasm.c in t1utils before 1.39 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
References (10)
Core 10
Core References
Various Sources x_refsource_confirm
https://github.com/kohler/t1utils/blob/master/NEWS
Patch x_refsource_confirm
https://github.com/kohler/t1utils/commit/6b9d1aafcb61a3663c883663eb19ccdbfcde8d33
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/05/13/9
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/74674
Exploit x_refsource_confirm
https://github.com/kohler/t1utils/issues/4
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/05/22/10
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201507-10
Exploit x_refsource_confirm
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779274
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1218365
Various Sources vendor-advisory
x_refsource_ubuntu
http://ubuntu.com/usn/usn-2627-1
Scores
EPSS
0.0471
EPSS Percentile
89.4%
Details
CWE
CWE-119
Status
published
Products (3)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
14.10
t1utils_project/t1utils
1.38
Published
Jun 08, 2015
Tracked Since
Feb 18, 2026