Summary
Detail | |||
---|---|---|---|
Vendor | Freetype | First view | 2010-08-19 |
Product | Freetype | Last view | 2022-04-22 |
Version | 2.4.4 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:freetype:freetype |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2022-04-22 | CVE-2022-27406 | FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size. |
7.5 | 2022-04-22 | CVE-2022-27405 | FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request. |
9.8 | 2022-04-22 | CVE-2022-27404 | FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face. |
6.5 | 2020-11-03 | CVE-2020-15999 | Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
6.5 | 2019-09-03 | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. |
6.5 | 2019-09-03 | CVE-2015-9382 | FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation. |
8.8 | 2019-09-03 | CVE-2015-9381 | FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c. |
9.8 | 2019-07-30 | CVE-2015-9290 | In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again. |
6.5 | 2018-02-13 | CVE-2018-6942 | An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file. |
9.8 | 2017-04-26 | CVE-2017-8287 | FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c. |
9.8 | 2017-04-24 | CVE-2017-8105 | FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. |
9.8 | 2017-04-14 | CVE-2017-7864 | FreeType 2 before 2017-02-02 has an out-of-bounds write caused by a heap-based buffer overflow related to the tt_size_reset function in truetype/ttobjs.c. |
9.8 | 2017-04-14 | CVE-2017-7858 | FreeType 2 before 2017-03-07 has an out-of-bounds write related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c. |
9.8 | 2017-04-14 | CVE-2017-7857 | FreeType 2 before 2017-03-08 has an out-of-bounds write caused by a heap-based buffer overflow related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c. |
9.8 | 2017-04-14 | CVE-2016-10328 | FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. |
7.8 | 2017-03-06 | CVE-2016-10244 | The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file. |
7.5 | 2016-06-07 | CVE-2014-9747 | The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font. |
9.8 | 2016-06-07 | CVE-2014-9746 | The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font. |
5 | 2015-09-14 | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. |
5 | 2015-02-08 | CVE-2014-9675 | bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font. |
7.5 | 2015-02-08 | CVE-2014-9674 | The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font. |
6.8 | 2015-02-08 | CVE-2014-9673 | Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font. |
5.8 | 2015-02-08 | CVE-2014-9672 | Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file. |
4.3 | 2015-02-08 | CVE-2014-9671 | Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented. |
4.3 | 2015-02-08 | CVE-2014-9670 | Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
53% (33) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
16% (10) | CWE-125 | Out-of-bounds Read |
11% (7) | CWE-787 | Out-of-bounds Write |
6% (4) | CWE-189 | Numeric Errors |
4% (3) | CWE-20 | Improper Input Validation |
3% (2) | CWE-476 | NULL Pointer Dereference |
3% (2) | CWE-399 | Resource Management Errors |
1% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
73661 | FreeType t1_decoder_parse_charstrings() Function PostScript Type1 Font Handli... |
67306 | FreeType bdf/bdflib.c Crafted BDF Font File Handling DoS |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2428-1 (freetype - several vulnerabilities) File : nvt/deb_2428_1.nasl |
2012-12-13 | Name : SuSE Update for freetype2 openSUSE-SU-2012:0489-1 (freetype2) File : nvt/gb_suse_2012_0489_1.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2012-176-01 freetype File : nvt/esoft_slk_ssa_2012_176_01.nasl |
2012-08-03 | Name : Mandriva Update for freetype2 MDVSA-2012:057 (freetype2) File : nvt/gb_mandriva_MDVSA_2012_057.nasl |
2012-07-30 | Name : CentOS Update for freetype CESA-2012:0467 centos5 File : nvt/gb_CESA-2012_0467_freetype_centos5.nasl |
2012-07-30 | Name : CentOS Update for freetype CESA-2012:0467 centos6 File : nvt/gb_CESA-2012_0467_freetype_centos6.nasl |
2012-06-06 | Name : RedHat Update for freetype RHSA-2011:1085-01 File : nvt/gb_RHSA-2011_1085-01_freetype.nasl |
2012-04-30 | Name : FreeBSD Ports: freetype2 File : nvt/freebsd_freetype25.nasl |
2012-04-30 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox65.nasl |
2012-04-30 | Name : Gentoo Security Advisory GLSA 201204-04 (FreeType) File : nvt/glsa_201204_04.nasl |
2012-04-26 | Name : Fedora Update for freetype FEDORA-2012-5422 File : nvt/gb_fedora_2012_5422_freetype_fc15.nasl |
2012-04-11 | Name : RedHat Update for freetype RHSA-2012:0467-01 File : nvt/gb_RHSA-2012_0467-01_freetype.nasl |
2012-03-26 | Name : Ubuntu Update for freetype USN-1403-1 File : nvt/gb_ubuntu_USN_1403_1.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201201-09 (FreeType) File : nvt/glsa_201201_09.nasl |
2011-12-05 | Name : Fedora Update for freetype FEDORA-2011-15964 File : nvt/gb_fedora_2011_15964_freetype_fc15.nasl |
2011-12-02 | Name : Fedora Update for freetype FEDORA-2011-15956 File : nvt/gb_fedora_2011_15956_freetype_fc14.nasl |
2011-11-11 | Name : Fedora Update for freetype FEDORA-2011-14749 File : nvt/gb_fedora_2011_14749_freetype_fc15.nasl |
2011-10-20 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006) File : nvt/gb_macosx_su11-006.nasl |
2011-09-21 | Name : FreeBSD Ports: freetype2 File : nvt/freebsd_freetype23.nasl |
2011-09-21 | Name : Debian Security Advisory DSA 2294-1 (freetype) File : nvt/deb_2294_1.nasl |
2011-09-07 | Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007) File : nvt/gb_macosx_su10-007.nasl |
2011-09-07 | Name : Fedora Update for freetype FEDORA-2011-9525 File : nvt/gb_fedora_2011_9525_freetype_fc14.nasl |
2011-08-02 | Name : Mandriva Update for freetype2 MDVSA-2011:120 (freetype2) File : nvt/gb_mandriva_MDVSA_2011_120.nasl |
2011-07-27 | Name : Ubuntu Update for freetype USN-1173-1 File : nvt/gb_ubuntu_USN_1173_1.nasl |
2010-09-01 | Name : FreeType Multiple denial of service vulnerabilities (Windows) File : nvt/secpod_freetype_mult_dos_vuln_win.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-01 | Google Chrome PNG in TTF parsing heap overflow attempt RuleID : 56133 - Type : BROWSER-CHROME - Revision : 2 |
2020-12-01 | Google Chrome PNG in TTF parsing heap overflow attempt RuleID : 56132 - Type : BROWSER-CHROME - Revision : 2 |
2020-12-01 | Google Chrome PNG in TTF parsing heap overflow attempt RuleID : 56131 - Type : BROWSER-CHROME - Revision : 2 |
2020-12-01 | Google Chrome PNG in TTF parsing heap overflow attempt RuleID : 56130 - Type : BROWSER-CHROME - Revision : 2 |
2017-08-23 | FreeType PostScript Type1 font parsing memory corruption attempt RuleID : 43677 - Type : FILE-PDF - Revision : 2 |
2017-08-23 | FreeType PostScript Type1 font parsing memory corruption attempt RuleID : 43676 - Type : FILE-PDF - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-21 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1381.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0015.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0017.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0041.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0148.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0058.nasl - Type: ACT_GATHER_INFO |
2018-02-21 | Name: The remote Fedora host is missing a security update. File: fedora_2018-07a3e36499.nasl - Type: ACT_GATHER_INFO |
2017-07-21 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2017-1114.nasl - Type: ACT_GATHER_INFO |
2017-07-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-71b9a2ef5f.nasl - Type: ACT_GATHER_INFO |
2017-06-16 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2017-1110.nasl - Type: ACT_GATHER_INFO |
2017-06-07 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201706-14.nasl - Type: ACT_GATHER_INFO |
2017-05-19 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_4a088d673af211e79d75c86000169601.nasl - Type: ACT_GATHER_INFO |
2017-05-18 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3282-2.nasl - Type: ACT_GATHER_INFO |
2017-05-17 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2017-136-01.nasl - Type: ACT_GATHER_INFO |
2017-05-10 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3282-1.nasl - Type: ACT_GATHER_INFO |
2017-05-08 | Name: The remote Debian host is missing a security update. File: debian_DLA-931.nasl - Type: ACT_GATHER_INFO |
2017-05-08 | Name: The remote Fedora host is missing a security update. File: fedora_2017-5760b80676.nasl - Type: ACT_GATHER_INFO |
2017-05-08 | Name: The remote Fedora host is missing a security update. File: fedora_2017-950cc68400.nasl - Type: ACT_GATHER_INFO |
2017-05-01 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3839.nasl - Type: ACT_GATHER_INFO |
2017-04-27 | Name: The remote Debian host is missing a security update. File: debian_DLA-918.nasl - Type: ACT_GATHER_INFO |
2017-04-21 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3263-1.nasl - Type: ACT_GATHER_INFO |
2017-04-18 | Name: The remote Debian host is missing a security update. File: debian_DLA-900.nasl - Type: ACT_GATHER_INFO |
2017-03-21 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-3237-1.nasl - Type: ACT_GATHER_INFO |
2017-03-14 | Name: The remote Fedora host is missing a security update. File: fedora_2017-3886afeb06.nasl - Type: ACT_GATHER_INFO |
2017-03-13 | Name: The remote Fedora host is missing a security update. File: fedora_2017-c09c0cc384.nasl - Type: ACT_GATHER_INFO |