type42/t42parse.c in FreeType prior to 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote malicious users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
canonical ubuntu linux 15.04 |
||
canonical ubuntu linux 14.10 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 10.04 |
||
debian debian linux 7.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux hpc node 7.0 |
||
redhat enterprise linux hpc node 6 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux server eus 7.1 |
||
redhat enterprise linux hpc node eus 7.1 |
||
redhat enterprise linux server eus 6.6.z |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux server 7.0 |
||
freetype freetype |
||
opensuse opensuse 13.2 |
||
opensuse opensuse 13.1 |
||
fedoraproject fedora 21 |
||
fedoraproject fedora 20 |