Description
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
References (5)
Core 5
Core References
Exploit, Third Party Advisory x_refsource_misc
https://savannah.nongnu.org/bugs/?45923
Patch, Third Party Advisory x_refsource_misc
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/08/msg00019.html
Vendor Advisory x_refsource_confirm
https://support.f5.com/csp/article/K38315305
Vendor Advisory x_refsource_confirm
https://support.f5.com/csp/article/K38315305?utm_source=f5support&%3Butm_medium=RSS
Scores
CVSS v3
9.8
EPSS
0.0049
EPSS Percentile
65.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-125
Status
published
Products (1)
freetype/freetype
< 2.6.1
Published
Jul 30, 2019
Tracked Since
Feb 18, 2026