7.5
CVSSv2

CVE-2008-1807

Published: 16/06/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

FreeType2 prior to 2.3.6 allow context-dependent malicious users to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype 1.3.1

freetype freetype 2.3.5

freetype freetype 2.3.3

freetype freetype 2.3.4

Vendor Advisories

Debian Bug report logs - #485841 freetype: multiple security issues Package: freetype; Maintainer for freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Thomas Bläsing <thomasbl@poolmathtu-berlinde> Date: Wed, 11 Jun 2008 20:03:03 UTC Severity: grave Tags: security Found in version 235-1 Fixed ...
Multiple flaws were discovered in the PFB and TTF font handling code in freetype If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges or cause the application linked against freetype to crash, leading to a denial of service ...
Several local vulnerabilities have been discovered in freetype, a FreeType 2 font engine, which could allow the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1806 An integer overflow allows context-dependent attackers to execute arbitrary code via a crafted set of ...

References

CWE-189http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780http://www.securityfocus.com/bid/29641http://securitytracker.com/id?1020239http://secunia.com/advisories/30600http://secunia.com/advisories/30819http://www.vmware.com/support/server/doc/releasenotes_server.htmlhttp://secunia.com/advisories/30967https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.htmlhttp://lists.apple.com/archives/security-announce//2008/Sep/msg00003.htmlhttp://secunia.com/advisories/31712http://security.gentoo.org/glsa/glsa-200806-10.xmlhttp://secunia.com/advisories/30821http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlhttp://secunia.com/advisories/31709http://secunia.com/advisories/30766https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.htmlhttp://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlhttp://secunia.com/advisories/31711http://support.avaya.com/elmodocs2/security/ASA-2008-318.htmhttp://www.vmware.com/security/advisories/VMSA-2008-0014.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1http://www.redhat.com/support/errata/RHSA-2008-0558.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlhttp://secunia.com/advisories/30740http://secunia.com/advisories/30721http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:121http://secunia.com/advisories/31707http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0556.htmlhttp://www.vmware.com/support/player/doc/releasenotes_player.htmlhttp://www.ubuntu.com/usn/usn-643-1http://secunia.com/advisories/31856http://secunia.com/advisories/31900http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.htmlhttp://support.apple.com/kb/HT3129http://secunia.com/advisories/31823http://secunia.com/advisories/31577http://support.apple.com/kb/HT3026https://issues.rpath.com/browse/RPL-2608http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255http://secunia.com/advisories/31479http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2008/2558http://www.vupen.com/english/advisories/2008/2525http://www.vupen.com/english/advisories/2008/2423http://www.vupen.com/english/advisories/2008/2466http://www.vupen.com/english/advisories/2008/1876/referenceshttp://www.vupen.com/english/advisories/2008/1794http://security.gentoo.org/glsa/glsa-201209-25.xmlhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767http://www.securityfocus.com/archive/1/495869/100/0/threadedhttp://www.securityfocus.com/archive/1/495497/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841https://usn.ubuntu.com/643-1/https://nvd.nist.gov