7.5
CVSSv2

CVE-2015-3905

Published: 08/06/2015 Updated: 31/12/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the set_cs_start function in t1disasm.c in t1utils prior to 1.39 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

t1utils project t1utils 1.38

Vendor Advisories

Debian Bug report logs - #779274 t1utils: CVE-2015-3905: buffer overflow in set_cs_start Package: t1utils; Maintainer for t1utils is Niels Thykier <niels@thykiernet>; Source for t1utils is src:t1utils (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Thu, 26 Feb 2015 11:33:02 UTC Severity: grav ...
t1utils could be made to crash or run programs as your login if it opened a specially crafted file ...
A buffer overflow flaw was found in the way t1utils processed, for example, certain PFB (Printer Font Binary) files An attacker could use this flaw to potentially execute arbitrary code by tricking a user into processing a specially crafted PFB file with t1utils ...