Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freetype freetype 2.4.9 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2014-9746
The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType prior to 2.5.4 do not check return values, wh...
Freetype Freetype
Debian Debian Linux 8.0
Debian Debian Linux 7.0
7.5
CVSSv3
CVE-2014-9747
The t42_parse_encoding function in type42/t42parse.c in FreeType prior to 2.5.4 does not properly update the current position for immediates-only mode, which allows remote malicious users to cause a denial of service (infinite loop) via a Type42 font.
Freetype Freetype
Debian Debian Linux 8.0
Debian Debian Linux 7.0
NA
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType prior to 2.5.3 allows remote malicious users to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
Freetype Freetype
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Opensuse Opensuse 13.1
NA
CVE-2014-9656
The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType prior to 2.5.4 does not properly check for an integer overflow, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenT...
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Freetype Freetype
Debian Debian Linux 7.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
NA
CVE-2014-9657
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType prior to 2.5.4 does not establish a minimum record size, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 6.0
Oracle Solaris 10.0
Oracle Solaris 11.2
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Freetype Freetype
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
NA
CVE-2014-9658
The tt_face_load_kern function in sfnt/ttkern.c in FreeType prior to 2.5.4 enforces an incorrect minimum table length, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Oracle Solaris 10.0
Oracle Solaris 11.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Freetype Freetype
Debian Debian Linux 7.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
NA
CVE-2014-9660
The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType prior to 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote malicious users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF fon...
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Oracle Solaris 10.0
Oracle Solaris 11.2
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 6.0
NA
CVE-2014-9661
type42/t42parse.c in FreeType prior to 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote malicious users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Hpc Node 6
Freetype Freetype
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Fedoraproject Fedora 20
Fedoraproject Fedora 21
NA
CVE-2014-9663
The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType prior to 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified ...
Freetype Freetype
Debian Debian Linux 7.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Oracle Solaris 10.0
Oracle Solaris 11.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
NA
CVE-2014-9664
FreeType prior to 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c a...
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Hpc Node 6
Debian Debian Linux 7.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Freetype Freetype
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »