7.5
CVSSv2

CVE-2014-9662

Published: 08/02/2015 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

cff/cf2ft.c in FreeType prior to 2.5.4 does not validate the return values of point-allocation functions, which allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 13.2

opensuse opensuse 13.1

debian debian linux 7.0

canonical ubuntu linux 12.04

canonical ubuntu linux 10.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

fedoraproject fedora 21

fedoraproject fedora 20

freetype freetype

Vendor Advisories

Debian Bug report logs - #777656 freetype: various new security issues Package: src:freetype; Maintainer for src:freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 11 Feb 2015 06:54:07 UTC Severity: grave Tags: fixed-upstream, security, upstream Fo ...
FreeType could be made to crash or run programs as your login if it opened a specially crafted file ...