Skip to main content

CVE-2022-35065: n/a in n/a

Medium
VulnerabilityCVE-2022-35065cvecve-2022-35065
Published: Mon Sep 19 2022 (09/19/2022, 21:23:57 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x65f724.

AI-Powered Analysis

AILast updated: 07/08/2025, 02:11:05 UTC

Technical Analysis

CVE-2022-35065 is a medium-severity vulnerability identified in the OTFCC project, specifically linked to a segmentation violation occurring in the otfccdump binary at the memory address offset +0x65f724. OTFCC (OpenType Font C Compiler) is a tool used for compiling and dumping OpenType font files, often utilized in font development and processing workflows. The vulnerability is classified under CWE-787, which corresponds to out-of-bounds write or buffer overflow errors. Such errors occur when a program writes data outside the boundaries of allocated memory, potentially leading to crashes or arbitrary code execution. In this case, the segmentation violation indicates that the program attempts to access invalid memory, causing it to crash. The CVSS v3.1 score of 6.5 reflects a medium severity level, with the vector indicating that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. This suggests that exploitation would cause a denial of service (DoS) by crashing the otfccdump process, but would not allow data leakage or modification. No known exploits are currently reported in the wild, and no patches or vendor information are provided, indicating that this vulnerability may be in an open-source or less widely tracked project. The lack of affected versions and vendor details limits the ability to precisely identify impacted deployments, but any environment using OTFCC tools for font processing could be vulnerable if they use the affected commit or build.

Potential Impact

For European organizations, the primary impact of CVE-2022-35065 is the potential for denial of service in font processing pipelines that rely on the OTFCC tool. Organizations involved in digital publishing, graphic design, font development, or any automated workflows that compile or analyze OpenType fonts using OTFCC could experience service interruptions or crashes. While the vulnerability does not allow data theft or code execution, disruption of font processing could delay content production or affect rendering services. This could be particularly impactful for media companies, software vendors, or government agencies that depend on automated font handling. Since the attack requires user interaction, the risk is somewhat mitigated in fully automated environments but remains relevant if users open crafted font files or trigger font dumps manually. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation (no privileges required) mean organizations should proactively address this issue to avoid service disruptions.

Mitigation Recommendations

To mitigate CVE-2022-35065, European organizations should first identify any usage of the OTFCC tool in their environments, including development, testing, and production systems. Since no official patches are currently linked, organizations should monitor the OTFCC project repository for updates or commits addressing this segmentation violation. In the interim, restricting access to otfccdump binaries and limiting user interaction with untrusted font files can reduce exploitation risk. Implementing input validation and sandboxing the font processing environment can contain potential crashes and prevent broader system impact. Additionally, organizations should consider alternative font processing tools with active maintenance and security support if OTFCC usage is critical. Regularly updating software dependencies and integrating vulnerability scanning into CI/CD pipelines will help detect and remediate similar issues promptly. Finally, educating users about the risks of opening untrusted font files can further reduce attack vectors requiring user interaction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68387633182aa0cae28217b6

Added to database: 5/29/2025, 2:58:59 PM

Last enriched: 7/8/2025, 2:11:05 AM

Last updated: 7/29/2025, 3:12:08 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats