6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
0.013 Low
EPSS
Percentile
85.6%
Package : freetype
Version : 2.5.2-3+deb8u4
CVE ID : CVE-2015-9381 CVE-2015-9382 CVE-2015-9383
Several newly-referenced issues have been fixed in the FreeType 2 font
engine.
CVE-2015-9381
heap-based buffer over-read in T1_Get_Private_Dict in
type1/t1parse.c
CVE-2015-9382
buffer over-read in skip_comment in psaux/psobjs.c because
ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face
operation
CVE-2015-9383
a heap-based buffer over-read in tt_cmap14_validate in
sfnt/ttcmap.c
For Debian 8 "Jessie", these problems have been fixed in version
2.5.2-3+deb8u4.
We recommend that you upgrade your freetype packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | amd64 | freetype2-demos | < 2.5.2-3+deb8u4 | freetype2-demos_2.5.2-3+deb8u4_amd64.deb |
Debian | 8 | all | freetype | < 2.5.2-3+deb8u4 | freetype_2.5.2-3+deb8u4_all.deb |
Debian | 8 | amd64 | libfreetype6-udeb | < 2.5.2-3+deb8u4 | libfreetype6-udeb_2.5.2-3+deb8u4_amd64.deb |
Debian | 8 | i386 | libfreetype6-udeb | < 2.5.2-3+deb8u4 | libfreetype6-udeb_2.5.2-3+deb8u4_i386.deb |
Debian | 8 | amd64 | libfreetype6-dev | < 2.5.2-3+deb8u4 | libfreetype6-dev_2.5.2-3+deb8u4_amd64.deb |
Debian | 8 | armel | libfreetype6 | < 2.5.2-3+deb8u4 | libfreetype6_2.5.2-3+deb8u4_armel.deb |
Debian | 8 | amd64 | libfreetype6 | < 2.5.2-3+deb8u4 | libfreetype6_2.5.2-3+deb8u4_amd64.deb |
Debian | 8 | armel | libfreetype6-udeb | < 2.5.2-3+deb8u4 | libfreetype6-udeb_2.5.2-3+deb8u4_armel.deb |
Debian | 8 | i386 | freetype2-demos | < 2.5.2-3+deb8u4 | freetype2-demos_2.5.2-3+deb8u4_i386.deb |
Debian | 8 | armhf | libfreetype6-dev | < 2.5.2-3+deb8u4 | libfreetype6-dev_2.5.2-3+deb8u4_armhf.deb |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
0.013 Low
EPSS
Percentile
85.6%