6.8
CVSSv2

CVE-2010-2527

Published: 19/08/2010 Updated: 06/04/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 613
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in demo programs in FreeType prior to 2.4.0 allow remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype

debian debian linux 5.0

canonical ubuntu linux 6.06

canonical ubuntu linux 8.04

canonical ubuntu linux 9.04

canonical ubuntu linux 9.10

canonical ubuntu linux 10.04

Vendor Advisories

Robert Święcki discovered that FreeType did not correctly handle certain malformed font files If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges ...
Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 4 and 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common V ...
Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 3The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnera ...