5.8
CVSSv2

CVE-2014-9672

Published: 08/02/2015 Updated: 30/10/2018
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Summary

Array index error in the parse_fond function in base/ftmac.c in FreeType prior to 2.5.4 allows remote malicious users to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.

Vulnerable Product Search on Vulmon Subscribe to Product

oracle solaris 11.2

oracle solaris 10.0

debian debian linux 7.0

canonical ubuntu linux 15.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 10.04

freetype freetype

opensuse opensuse 13.2

opensuse opensuse 13.1

Vendor Advisories

Debian Bug report logs - #777656 freetype: various new security issues Package: src:freetype; Maintainer for src:freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 11 Feb 2015 06:54:07 UTC Severity: grave Tags: fixed-upstream, security, upstream Fo ...
FreeType could be made to crash or run programs as your login if it opened a specially crafted file ...
Mateusz Jurczyk discovered multiple vulnerabilities in Freetype Opening malformed fonts may result in denial of service or the execution of arbitrary code For the stable distribution (wheezy), these problems have been fixed in version 249-11+deb7u1 For the upcoming stable distribution (jessie), these problems have been fixed in version 252- ...