Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2014-9664

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2014-9664
Last Modified 15 Sep 2015 09:59:37
Published 08 Feb 2015 06:59:26
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2014-9664

Summary

FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.

Vulnerable Systems

Operating System

  • Canonical Ubuntu Linux 10.04

  • Canonical Ubuntu Linux 12.04

  • Canonical Ubuntu Linux 14.04

  • Canonical Ubuntu Linux 14.10

  • Debian Linux 7.0

Application

  • Freetype 2.5.3


References

CONFIRM - http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=dd89710f0f643eb0f99a3830e0712d26c7642acd

CONFIRM - http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=73be9f9ab67842cfbec36ee99e8d2301434c84ca

MISC - http://code.google.com/p/google-security-research/issues/detail?id=183

UBUNTU - USN-2510-1

DEBIAN - DSA-3188

MANDRIVA - MDVSA-2015:055

REDHAT - RHSA-2015:0696

FEDORA - FEDORA-2015-2216

FEDORA - FEDORA-2015-2237

CONFIRM - http://advisories.mageia.org/MGASA-2015-0083.html

SUSE - openSUSE-SU-2015:0627

UBUNTU - USN-2739-1


Last Updated: 27 May 2016 11:08:10