Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2014-9669
Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.018
EPSS Ranking
81.8%
CVSS Severity
CVSS v2 Score
6.8
References
http://advisories.mageia.org/MGASA-2015-0083.html
http://code.google.com/p/google-security-research/issues/detail?id=163
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=602040b1112c9f94d68e200be59ea7ac3d104565
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
http://rhn.redhat.com/errata/RHSA-2015-0696.html
http://www.debian.org/security/2015/dsa-3188
http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.securityfocus.com/bid/72986
http://www.ubuntu.com/usn/USN-2510-1
http://www.ubuntu.com/usn/USN-2739-1
https://security.gentoo.org/glsa/201503-05
http://advisories.mageia.org/MGASA-2015-0083.html
http://code.google.com/p/google-security-research/issues/detail?id=163
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=602040b1112c9f94d68e200be59ea7ac3d104565
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
http://rhn.redhat.com/errata/RHSA-2015-0696.html
http://www.debian.org/security/2015/dsa-3188
http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.securityfocus.com/bid/72986
http://www.ubuntu.com/usn/USN-2510-1
http://www.ubuntu.com/usn/USN-2739-1
https://security.gentoo.org/glsa/201503-05
Products affected by CVE-2014-9669
Freetype
»
Freetype
»
Version:
N/A
cpe:2.3:a:freetype:freetype:-
Freetype
»
Freetype
»
Version:
1.3.1
cpe:2.3:a:freetype:freetype:1.3.1
Freetype
»
Freetype
»
Version:
2.0
cpe:2.3:a:freetype:freetype:2.0
Freetype
»
Freetype
»
Version:
2.0.0
cpe:2.3:a:freetype:freetype:2.0.0
Freetype
»
Freetype
»
Version:
2.0.1
cpe:2.3:a:freetype:freetype:2.0.1
Freetype
»
Freetype
»
Version:
2.0.2
cpe:2.3:a:freetype:freetype:2.0.2
Freetype
»
Freetype
»
Version:
2.0.3
cpe:2.3:a:freetype:freetype:2.0.3
Freetype
»
Freetype
»
Version:
2.0.4
cpe:2.3:a:freetype:freetype:2.0.4
Freetype
»
Freetype
»
Version:
2.0.5
cpe:2.3:a:freetype:freetype:2.0.5
Freetype
»
Freetype
»
Version:
2.0.6
cpe:2.3:a:freetype:freetype:2.0.6
Freetype
»
Freetype
»
Version:
2.0.7
cpe:2.3:a:freetype:freetype:2.0.7
Freetype
»
Freetype
»
Version:
2.0.8
cpe:2.3:a:freetype:freetype:2.0.8
Freetype
»
Freetype
»
Version:
2.0.9
cpe:2.3:a:freetype:freetype:2.0.9
Freetype
»
Freetype
»
Version:
2.1
cpe:2.3:a:freetype:freetype:2.1
Freetype
»
Freetype
»
Version:
2.1.0
cpe:2.3:a:freetype:freetype:2.1.0
Freetype
»
Freetype
»
Version:
2.1.1
cpe:2.3:a:freetype:freetype:2.1.1
Freetype
»
Freetype
»
Version:
2.1.10
cpe:2.3:a:freetype:freetype:2.1.10
Freetype
»
Freetype
»
Version:
2.1.2
cpe:2.3:a:freetype:freetype:2.1.2
Freetype
»
Freetype
»
Version:
2.1.3
cpe:2.3:a:freetype:freetype:2.1.3
Freetype
»
Freetype
»
Version:
2.1.4
cpe:2.3:a:freetype:freetype:2.1.4
Freetype
»
Freetype
»
Version:
2.1.5
cpe:2.3:a:freetype:freetype:2.1.5
Freetype
»
Freetype
»
Version:
2.1.6
cpe:2.3:a:freetype:freetype:2.1.6
Freetype
»
Freetype
»
Version:
2.1.7
cpe:2.3:a:freetype:freetype:2.1.7
Freetype
»
Freetype
»
Version:
2.1.8
cpe:2.3:a:freetype:freetype:2.1.8
Freetype
»
Freetype
»
Version:
2.1.8_rc1
cpe:2.3:a:freetype:freetype:2.1.8_rc1
Freetype
»
Freetype
»
Version:
2.1.9
cpe:2.3:a:freetype:freetype:2.1.9
Freetype
»
Freetype
»
Version:
2.2
cpe:2.3:a:freetype:freetype:2.2
Freetype
»
Freetype
»
Version:
2.2.0
cpe:2.3:a:freetype:freetype:2.2.0
Freetype
»
Freetype
»
Version:
2.2.1
cpe:2.3:a:freetype:freetype:2.2.1
Freetype
»
Freetype
»
Version:
2.3.0
cpe:2.3:a:freetype:freetype:2.3.0
Freetype
»
Freetype
»
Version:
2.3.1
cpe:2.3:a:freetype:freetype:2.3.1
Freetype
»
Freetype
»
Version:
2.3.10
cpe:2.3:a:freetype:freetype:2.3.10
Freetype
»
Freetype
»
Version:
2.3.11
cpe:2.3:a:freetype:freetype:2.3.11
Freetype
»
Freetype
»
Version:
2.3.12
cpe:2.3:a:freetype:freetype:2.3.12
Freetype
»
Freetype
»
Version:
2.3.2
cpe:2.3:a:freetype:freetype:2.3.2
Freetype
»
Freetype
»
Version:
2.3.3
cpe:2.3:a:freetype:freetype:2.3.3
Freetype
»
Freetype
»
Version:
2.3.4
cpe:2.3:a:freetype:freetype:2.3.4
Freetype
»
Freetype
»
Version:
2.3.5
cpe:2.3:a:freetype:freetype:2.3.5
Freetype
»
Freetype
»
Version:
2.3.6
cpe:2.3:a:freetype:freetype:2.3.6
Freetype
»
Freetype
»
Version:
2.3.7
cpe:2.3:a:freetype:freetype:2.3.7
Freetype
»
Freetype
»
Version:
2.3.8
cpe:2.3:a:freetype:freetype:2.3.8
Freetype
»
Freetype
»
Version:
2.3.9
cpe:2.3:a:freetype:freetype:2.3.9
Freetype
»
Freetype
»
Version:
2.4.0
cpe:2.3:a:freetype:freetype:2.4.0
Freetype
»
Freetype
»
Version:
2.4.1
cpe:2.3:a:freetype:freetype:2.4.1
Freetype
»
Freetype
»
Version:
2.4.10
cpe:2.3:a:freetype:freetype:2.4.10
Freetype
»
Freetype
»
Version:
2.4.11
cpe:2.3:a:freetype:freetype:2.4.11
Freetype
»
Freetype
»
Version:
2.4.12
cpe:2.3:a:freetype:freetype:2.4.12
Freetype
»
Freetype
»
Version:
2.4.2
cpe:2.3:a:freetype:freetype:2.4.2
Freetype
»
Freetype
»
Version:
2.4.3
cpe:2.3:a:freetype:freetype:2.4.3
Freetype
»
Freetype
»
Version:
2.4.4
cpe:2.3:a:freetype:freetype:2.4.4
Freetype
»
Freetype
»
Version:
2.4.5
cpe:2.3:a:freetype:freetype:2.4.5
Freetype
»
Freetype
»
Version:
2.4.6
cpe:2.3:a:freetype:freetype:2.4.6
Freetype
»
Freetype
»
Version:
2.4.7
cpe:2.3:a:freetype:freetype:2.4.7
Freetype
»
Freetype
»
Version:
2.4.8
cpe:2.3:a:freetype:freetype:2.4.8
Freetype
»
Freetype
»
Version:
2.4.9
cpe:2.3:a:freetype:freetype:2.4.9
Freetype
»
Freetype
»
Version:
2.5
cpe:2.3:a:freetype:freetype:2.5
Freetype
»
Freetype
»
Version:
2.5.0
cpe:2.3:a:freetype:freetype:2.5.0
Freetype
»
Freetype
»
Version:
2.5.0.1
cpe:2.3:a:freetype:freetype:2.5.0.1
Freetype
»
Freetype
»
Version:
2.5.1
cpe:2.3:a:freetype:freetype:2.5.1
Freetype
»
Freetype
»
Version:
2.5.2
cpe:2.3:a:freetype:freetype:2.5.2
Freetype
»
Freetype
»
Version:
2.5.3
cpe:2.3:a:freetype:freetype:2.5.3
Canonical
»
Ubuntu Linux
»
Version:
10.04
cpe:2.3:o:canonical:ubuntu_linux:10.04
Canonical
»
Ubuntu Linux
»
Version:
12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04
Canonical
»
Ubuntu Linux
»
Version:
14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04
Canonical
»
Ubuntu Linux
»
Version:
14.10
cpe:2.3:o:canonical:ubuntu_linux:14.10
Canonical
»
Ubuntu Linux
»
Version:
15.04
cpe:2.3:o:canonical:ubuntu_linux:15.04
Debian
»
Debian Linux
»
Version:
7.0
cpe:2.3:o:debian:debian_linux:7.0
Fedoraproject
»
Fedora
»
Version:
20
cpe:2.3:o:fedoraproject:fedora:20
Fedoraproject
»
Fedora
»
Version:
21
cpe:2.3:o:fedoraproject:fedora:21
Opensuse
»
Opensuse
»
Version:
13.1
cpe:2.3:o:opensuse:opensuse:13.1
Opensuse
»
Opensuse
»
Version:
13.2
cpe:2.3:o:opensuse:opensuse:13.2
Oracle
»
Solaris
»
Version:
10.0
cpe:2.3:o:oracle:solaris:10.0
Oracle
»
Solaris
»
Version:
11.2
cpe:2.3:o:oracle:solaris:11.2
Redhat
»
Enterprise Linux Desktop
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
Redhat
»
Enterprise Linux Desktop
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
Redhat
»
Enterprise Linux Hpc Node
»
Version:
6
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6
Redhat
»
Enterprise Linux Hpc Node
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0
Redhat
»
Enterprise Linux Hpc Node Eus
»
Version:
7.1
cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1
Redhat
»
Enterprise Linux Server
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0
Redhat
»
Enterprise Linux Server
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0
Redhat
»
Enterprise Linux Server Eus
»
Version:
6.6.z
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6.z
Redhat
»
Enterprise Linux Server Eus
»
Version:
7.1
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1
Redhat
»
Enterprise Linux Workstation
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
Redhat
»
Enterprise Linux Workstation
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved