type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
Reference (s):
- BID:72986
- URL: http://www.securityfocus.com/bid/72986
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3788187e0c396952cd7d905c6c61f3ff8e84b2b4
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=42fcd6693ec7bd6ffc65ddc63e74287a65dda669

