6.8
CVSSv2

CVE-2014-9664

Published: 08/02/2015 Updated: 30/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

FreeType prior to 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux server eus 6.6.z

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux workstation 6.0

redhat enterprise linux server 6.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux desktop 7.0

redhat enterprise linux hpc node 6

redhat enterprise linux desktop 6.0

redhat enterprise linux server eus 7.1

redhat enterprise linux hpc node eus 7.1

debian debian linux 7.0

opensuse opensuse 13.2

opensuse opensuse 13.1

canonical ubuntu linux 15.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 10.04

fedoraproject fedora 20

fedoraproject fedora 21

freetype freetype

oracle solaris 10.0

oracle solaris 11.2

Vendor Advisories

Debian Bug report logs - #777656 freetype: various new security issues Package: src:freetype; Maintainer for src:freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 11 Feb 2015 06:54:07 UTC Severity: grave Tags: fixed-upstream, security, upstream Fo ...
FreeType could be made to crash or run programs as your login if it opened a specially crafted file ...
Mateusz Jurczyk discovered multiple vulnerabilities in Freetype Opening malformed fonts may result in denial of service or the execution of arbitrary code For the stable distribution (wheezy), these problems have been fixed in version 249-11+deb7u1 For the upcoming stable distribution (jessie), these problems have been fixed in version 252- ...
Multiple integer overflow flaws and an integer signedness flaw, leading to heap-based buffer overflows, were found in the way FreeType handled Mac fonts If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the us ...