7.5
CVSSv2

CVE-2008-1806

Published: 16/06/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in FreeType2 prior to 2.3.6 allows context-dependent malicious users to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype 2.3.4

freetype freetype 2.3.5

freetype freetype 1.3.1

freetype freetype 2.3.3

Vendor Advisories

Debian Bug report logs - #485841 freetype: multiple security issues Package: freetype; Maintainer for freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Thomas Bläsing <thomasbl@poolmathtu-berlinde> Date: Wed, 11 Jun 2008 20:03:03 UTC Severity: grave Tags: security Found in version 235-1 Fixed ...
Multiple flaws were discovered in the PFB and TTF font handling code in freetype If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges or cause the application linked against freetype to crash, leading to a denial of service ...
Several local vulnerabilities have been discovered in freetype, a FreeType 2 font engine, which could allow the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1806 An integer overflow allows context-dependent attackers to execute arbitrary code via a crafted set of ...

References

CWE-189http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780http://www.securityfocus.com/bid/29640http://securitytracker.com/id?1020238http://secunia.com/advisories/30600http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlhttp://www.vmware.com/security/advisories/VMSA-2008-0014.htmlhttp://secunia.com/advisories/30740http://www.vmware.com/support/server/doc/releasenotes_server.htmlhttp://secunia.com/advisories/30766http://www.redhat.com/support/errata/RHSA-2008-0558.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2008-318.htmhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.htmlhttp://secunia.com/advisories/31712http://secunia.com/advisories/30819http://www.redhat.com/support/errata/RHSA-2008-0556.htmlhttp://secunia.com/advisories/31709http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlhttp://secunia.com/advisories/31711http://secunia.com/advisories/30967http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.htmlhttp://secunia.com/advisories/31707http://www.mandriva.com/security/advisories?name=MDVSA-2008:121http://www.vmware.com/support/player/doc/releasenotes_player.htmlhttp://secunia.com/advisories/30821http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlhttp://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlhttp://security.gentoo.org/glsa/glsa-200806-10.xmlhttp://secunia.com/advisories/30721http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlhttp://secunia.com/advisories/31900http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.htmlhttp://www.ubuntu.com/usn/usn-643-1http://support.apple.com/kb/HT3129http://secunia.com/advisories/31856http://secunia.com/advisories/31823http://secunia.com/advisories/31577http://support.apple.com/kb/HT3026https://issues.rpath.com/browse/RPL-2608http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255http://secunia.com/advisories/31479http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2008/2558http://www.vupen.com/english/advisories/2008/2525http://www.vupen.com/english/advisories/2008/2423http://www.vupen.com/english/advisories/2008/2466http://www.vupen.com/english/advisories/2008/1876/referenceshttp://www.vupen.com/english/advisories/2008/1794http://security.gentoo.org/glsa/glsa-201209-25.xmlhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321http://www.securityfocus.com/archive/1/495869/100/0/threadedhttp://www.securityfocus.com/archive/1/495497/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841https://usn.ubuntu.com/643-1/https://nvd.nist.gov