6.8
CVSSv2

CVE-2010-2808

Published: 19/08/2010 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType prior to 2.4.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype

apple mac os x

apple iphone os

apple tvos

canonical ubuntu linux 9.04

canonical ubuntu linux 8.04

canonical ubuntu linux 9.10

canonical ubuntu linux 10.04

canonical ubuntu linux 6.06

Vendor Advisories

Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 4 and 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common ...
It was discovered that FreeType did not correctly handle certain malformed font files If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges ...
Several vulnerabilities have been discovered in the FreeType font library The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-1797 Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgloadc in FreeType allow remote at ...