Vulnerability CVE-2010-2808


Published: 2010-08-19   Modified: 2012-02-13

Description:
Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
FreeType 2.4.1 Memory corruption flaw by processing certain
Jan Lieskovsky
22.08.2010

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Freetype -> Freetype 

 References:
http://www.securityfocus.com/bid/42285
https://savannah.nongnu.org/bugs/?30658
https://rhn.redhat.com/errata/RHSA-2010-0737.html
https://bugzilla.redhat.com/show_bug.cgi?id=621907
https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
http://www.vupen.com/english/advisories/2010/3046
http://www.vupen.com/english/advisories/2010/3045
http://www.vupen.com/english/advisories/2010/2106
http://www.vupen.com/english/advisories/2010/2018
http://www.ubuntu.com/usn/USN-972-1
http://www.redhat.com/support/errata/RHSA-2010-0864.html
http://support.apple.com/kb/HT4457
http://support.apple.com/kb/HT4456
http://support.apple.com/kb/HT4435
http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
http://secunia.com/advisories/42317
http://secunia.com/advisories/42314
http://secunia.com/advisories/40982
http://secunia.com/advisories/40816
http://marc.info/?l=oss-security&m=128111955616772&w=2
http://marc.info/?l=oss-security&m=128110167119337&w=2
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2

Copyright 2024, cxsecurity.com

 

Back to Top