9.3
CVSSv2

CVE-2010-3311

Published: 07/01/2011 Updated: 13/02/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType prior to 2.4 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype 2.3.6

freetype freetype 2.1.9

freetype freetype 2.1.10

freetype freetype 2.3.4

freetype freetype 2.3.5

freetype freetype 2.1

freetype freetype 2.1.5

freetype freetype 2.3.10

freetype freetype

freetype freetype 1.3.1

freetype freetype 2.1.8

freetype freetype 2.2.10

freetype freetype 2.2.1

freetype freetype 2.1.3

freetype freetype 2.3.3

freetype freetype 2.1.6

freetype freetype 2.3.0

freetype freetype 2.3.1

freetype freetype 2.0.9

freetype freetype 2.3.7

freetype freetype 2.0.6

freetype freetype 2.3.8

freetype freetype 2.3.11

freetype freetype 2.3.2

freetype freetype 2.3.9

freetype freetype 2.1.7

freetype freetype 2.1.4

freetype freetype 2.2.0

Vendor Advisories

Marc Schoenefeld discovered that FreeType did not correctly handle certain malformed font files If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges This issue only affected Ubuntu 606 LTS, 804 LTS, 910 and 1004 LTS (CVE-2010-3 ...
Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 4 and 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common ...
Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix three security issues are now availablefor Red Hat Enterprise Linux 3The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerabi ...
Marc Schoenefeld has found an input stream position error in the way the FreeType font rendering engine processed input file streams If a user loaded a specially-crafted font file with an application linked against FreeType and relevant font glyphs were subsequently rendered with the X FreeType library (libXft), it could cause the application to c ...