7.5
CVSSv2

CVE-2008-1808

Published: 16/06/2008 Updated: 26/01/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple off-by-one errors in FreeType2 prior to 2.3.6 allow context-dependent malicious users to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype 2.0.9

freetype freetype 2.1.10

freetype freetype 2.3.4

freetype freetype 2.3.5

freetype freetype 1.3.1

freetype freetype 2.0.6

freetype freetype 2.2.10

freetype freetype 2.3.3

freetype freetype 2.2.0

freetype freetype 2.2.1

freetype freetype 2.1.7

freetype freetype 2.1.9

Vendor Advisories

Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having important security impact by the RedHat Security Response Team ...
Debian Bug report logs - #485841 freetype: multiple security issues Package: freetype; Maintainer for freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Thomas Bläsing <thomasbl@poolmathtu-berlinde> Date: Wed, 11 Jun 2008 20:03:03 UTC Severity: grave Tags: security Found in version 235-1 Fixed ...
Multiple flaws were discovered in the PFB and TTF font handling code in freetype If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges or cause the application linked against freetype to crash, leading to a denial of service ...
Several local vulnerabilities have been discovered in freetype, a FreeType 2 font engine, which could allow the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1806 An integer overflow allows context-dependent attackers to execute arbitrary code via a crafted set of ...

References

CWE-189http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780http://www.securityfocus.com/bid/29637http://www.securityfocus.com/bid/29639http://securitytracker.com/id?1020240http://secunia.com/advisories/30600http://secunia.com/advisories/31709http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlhttp://www.vmware.com/security/advisories/VMSA-2008-0014.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlhttp://secunia.com/advisories/30821http://support.avaya.com/elmodocs2/security/ASA-2008-318.htmhttp://www.vmware.com/support/player2/doc/releasenotes_player2.htmlhttp://www.vmware.com/support/server/doc/releasenotes_server.htmlhttp://lists.apple.com/archives/security-announce//2008/Sep/msg00003.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1http://secunia.com/advisories/30721http://secunia.com/advisories/30740http://secunia.com/advisories/31712http://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlhttp://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0558.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.htmlhttp://secunia.com/advisories/30766https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.htmlhttp://secunia.com/advisories/31707http://security.gentoo.org/glsa/glsa-200806-10.xmlhttp://www.redhat.com/support/errata/RHSA-2008-0556.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:121http://secunia.com/advisories/30967http://www.vmware.com/support/player/doc/releasenotes_player.htmlhttp://secunia.com/advisories/30819http://secunia.com/advisories/31711http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.htmlhttp://secunia.com/advisories/31856http://secunia.com/advisories/31900http://support.apple.com/kb/HT3129http://www.ubuntu.com/usn/usn-643-1http://secunia.com/advisories/31823http://secunia.com/advisories/31577http://support.apple.com/kb/HT3026http://secunia.com/advisories/31479http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255https://issues.rpath.com/browse/RPL-2608http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://secunia.com/advisories/35204http://www.redhat.com/support/errata/RHSA-2009-0329.htmlhttp://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2008/2558http://www.vupen.com/english/advisories/2008/2525http://www.vupen.com/english/advisories/2008/2423http://www.vupen.com/english/advisories/2008/2466http://www.vupen.com/english/advisories/2008/1876/referenceshttp://www.vupen.com/english/advisories/2008/1794http://security.gentoo.org/glsa/glsa-201209-25.xmlhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188http://www.securityfocus.com/archive/1/495869/100/0/threadedhttp://www.securityfocus.com/archive/1/495497/100/0/threadedhttps://access.redhat.com/errata/RHSA-2009:0329https://usn.ubuntu.com/643-1/https://nvd.nist.gov