Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9675

Опубликовано: 08 фев. 2015
Источник: debian
EPSS Низкий

Описание

bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freetypefixed2.5.2-3package

Примечания

  • http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2c4832d30939b45c05757f0a05128ce64c4cacc7

  • https://code.google.com/p/google-security-research/issues/detail?id=151

EPSS

Процентиль: 84%
0.02114
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.

redhat
почти 11 лет назад

bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.

nvd
почти 11 лет назад

bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.

github
больше 3 лет назад

bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.

oracle-oval
больше 10 лет назад

ELSA-2015-0696: freetype security update (IMPORTANT)

EPSS

Процентиль: 84%
0.02114
Низкий