CVE-2010-3814

Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
http://secunia.com/advisories/42314
http://secunia.com/advisories/43138
http://secunia.com/advisories/48951
http://security-tracker.debian.org/tracker/CVE-2010-3814
http://support.apple.com/kb/HT4456 Vendor Advisory
http://support.apple.com/kb/HT4581
http://www.debian.org/security/2011/dsa-2155
http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
http://www.securityfocus.com/bid/44643
http://www.securitytracker.com/id?1024767
http://www.ubuntu.com/usn/USN-1013-1
http://www.vupen.com/english/advisories/2010/3046
http://www.vupen.com/english/advisories/2011/0246
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
http://secunia.com/advisories/42314
http://secunia.com/advisories/43138
http://secunia.com/advisories/48951
http://security-tracker.debian.org/tracker/CVE-2010-3814
http://support.apple.com/kb/HT4456 Vendor Advisory
http://support.apple.com/kb/HT4581
http://www.debian.org/security/2011/dsa-2155
http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
http://www.securityfocus.com/bid/44643
http://www.securitytracker.com/id?1024767
http://www.ubuntu.com/usn/USN-1013-1
http://www.vupen.com/english/advisories/2010/3046
http://www.vupen.com/english/advisories/2011/0246
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221 -
References () http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4 - () http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4 -
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - () http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html -
References () http://secunia.com/advisories/42314 - () http://secunia.com/advisories/42314 -
References () http://secunia.com/advisories/43138 - () http://secunia.com/advisories/43138 -
References () http://secunia.com/advisories/48951 - () http://secunia.com/advisories/48951 -
References () http://security-tracker.debian.org/tracker/CVE-2010-3814 - () http://security-tracker.debian.org/tracker/CVE-2010-3814 -
References () http://support.apple.com/kb/HT4456 - Vendor Advisory () http://support.apple.com/kb/HT4456 - Vendor Advisory
References () http://support.apple.com/kb/HT4581 - () http://support.apple.com/kb/HT4581 -
References () http://www.debian.org/security/2011/dsa-2155 - () http://www.debian.org/security/2011/dsa-2155 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:236 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:236 -
References () http://www.securityfocus.com/bid/44643 - () http://www.securityfocus.com/bid/44643 -
References () http://www.securitytracker.com/id?1024767 - () http://www.securitytracker.com/id?1024767 -
References () http://www.ubuntu.com/usn/USN-1013-1 - () http://www.ubuntu.com/usn/USN-1013-1 -
References () http://www.vupen.com/english/advisories/2010/3046 - () http://www.vupen.com/english/advisories/2010/3046 -
References () http://www.vupen.com/english/advisories/2011/0246 - () http://www.vupen.com/english/advisories/2011/0246 -

Information

Published : 2010-11-26 20:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3814

Mitre link : CVE-2010-3814

CVE.ORG link : CVE-2010-3814


JSON object : View

Products Affected

freetype

  • freetype
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer