CVE-2014-9664
08.02.2015, 11:59
FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_hpc_node | 7.0 |
redhat | enterprise_linux_hpc_node_eus | 7.1 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_eus | 6.6.z:z |
redhat | enterprise_linux_server_eus | 7.1 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
debian | debian_linux | 7.0 |
opensuse | opensuse | 13.1 |
opensuse | opensuse | 13.2 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 14.10 |
canonical | ubuntu_linux | 15.04 |
freetype | freetype | 𝑥 ≤ 2.5.3 |
oracle | solaris | 10.0 |
oracle | solaris | 11.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References