5
CVSSv2

CVE-2014-9745

Published: 14/09/2015 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The parse_encoding function in type1/t1load.c in FreeType prior to 2.5.3 allows remote malicious users to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype

debian debian linux 8.0

debian debian linux 7.0

canonical ubuntu linux 15.04

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

opensuse opensuse 13.1

Vendor Advisories

Several security issues were fixed in FreeType ...
It was discovered that FreeType did not properly handle some malformed inputs This could allow remote attackers to cause a denial of service (crash) via crafted font files For the oldstable distribution (wheezy), these problems have been fixed in version 249-11+deb7u2 For the stable distribution (jessie), these problems have been fixed in ver ...
The parse_encoding function in type1/t1loadc in FreeType before 253 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage ...