7.5
CVSSv2

CVE-2008-1806

Published: 16/06/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in FreeType2 prior to 2.3.6 allows context-dependent malicious users to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype 2.3.4

freetype freetype 2.3.5

freetype freetype 1.3.1

freetype freetype 2.3.3

Vendor Advisories

Multiple flaws were discovered in the PFB and TTF font handling code in freetype If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges or cause the application linked against freetype to crash, leading to a denial of service ...
Debian Bug report logs - #485841 freetype: multiple security issues Package: freetype; Maintainer for freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Thomas Bläsing <thomasbl@poolmathtu-berlinde> Date: Wed, 11 Jun 2008 20:03:03 UTC Severity: grave Tags: security Found in version 235-1 Fixed ...
Several local vulnerabilities have been discovered in freetype, a FreeType 2 font engine, which could allow the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1806 An integer overflow allows context-dependent attackers to execute arbitrary code via a crafted set of ...

References

CWE-189http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780http://www.securityfocus.com/bid/29640http://securitytracker.com/id?1020238http://secunia.com/advisories/30600http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlhttp://www.vmware.com/security/advisories/VMSA-2008-0014.htmlhttp://secunia.com/advisories/30740http://www.vmware.com/support/server/doc/releasenotes_server.htmlhttp://secunia.com/advisories/30766http://www.redhat.com/support/errata/RHSA-2008-0558.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2008-318.htmhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.htmlhttp://secunia.com/advisories/31712http://secunia.com/advisories/30819http://www.redhat.com/support/errata/RHSA-2008-0556.htmlhttp://secunia.com/advisories/31709http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlhttp://secunia.com/advisories/31711http://secunia.com/advisories/30967http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.htmlhttp://secunia.com/advisories/31707http://www.mandriva.com/security/advisories?name=MDVSA-2008:121http://www.vmware.com/support/player/doc/releasenotes_player.htmlhttp://secunia.com/advisories/30821http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlhttp://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlhttp://security.gentoo.org/glsa/glsa-200806-10.xmlhttp://secunia.com/advisories/30721http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlhttp://secunia.com/advisories/31900http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.htmlhttp://www.ubuntu.com/usn/usn-643-1http://support.apple.com/kb/HT3129http://secunia.com/advisories/31856http://secunia.com/advisories/31823http://secunia.com/advisories/31577http://support.apple.com/kb/HT3026https://issues.rpath.com/browse/RPL-2608http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255http://secunia.com/advisories/31479http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2008/2558http://www.vupen.com/english/advisories/2008/2525http://www.vupen.com/english/advisories/2008/2423http://www.vupen.com/english/advisories/2008/2466http://www.vupen.com/english/advisories/2008/1876/referenceshttp://www.vupen.com/english/advisories/2008/1794http://security.gentoo.org/glsa/glsa-201209-25.xmlhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321http://www.securityfocus.com/archive/1/495869/100/0/threadedhttp://www.securityfocus.com/archive/1/495497/100/0/threadedhttps://usn.ubuntu.com/643-1/https://nvd.nist.gov