6.8
CVSSv2

CVE-2010-2519

Published: 19/08/2010 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 613
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType prior to 2.4.0 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype

canonical ubuntu linux 9.04

canonical ubuntu linux 9.10

canonical ubuntu linux 8.04

canonical ubuntu linux 10.04

canonical ubuntu linux 6.06

apple mac os x

debian debian linux 5.0

Vendor Advisories

Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 4 and 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common V ...
Robert Święcki discovered that FreeType did not correctly handle certain malformed font files If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges ...