7.5
CVSSv2

CVE-2014-9746

Published: 07/06/2016 Updated: 19/07/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType prior to 2.5.4 do not check return values, which allows remote malicious users to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype

debian debian linux 8.0

debian debian linux 7.0

Vendor Advisories

It was discovered that FreeType did not properly handle some malformed inputs This could allow remote attackers to cause a denial of service (crash) via crafted font files For the oldstable distribution (wheezy), these problems have been fixed in version 249-11+deb7u2 For the stable distribution (jessie), these problems have been fixed in ver ...
The (1) t1_parse_font_matrix function in type1/t1loadc, (2) cid_parse_font_matrix function in cid/cidloadc, (3) t42_parse_font_matrix function in type42/t42parsec, and (4) ps_parser_load_field function in psaux/psobjsc in FreeType before 254 do not check return values, which allows remote attackers to cause a denial of service (uninitialized ...