Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221 - | |
References | () http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a - | |
References | () http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html - | |
References | () http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html - | |
References | () http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html - | |
References | () http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html - | |
References | () http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html - | |
References | () http://secunia.com/advisories/42289 - | |
References | () http://secunia.com/advisories/42295 - | |
References | () http://secunia.com/advisories/43138 - | |
References | () http://secunia.com/advisories/48951 - | |
References | () http://support.apple.com/kb/HT4564 - | |
References | () http://support.apple.com/kb/HT4565 - | |
References | () http://support.apple.com/kb/HT4581 - | |
References | () http://support.apple.com/kb/HT4802 - | |
References | () http://support.apple.com/kb/HT4803 - | |
References | () http://support.avaya.com/css/P8/documents/100122733 - | |
References | () http://www.debian.org/security/2011/dsa-2155 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:235 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:236 - | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0889.html - | |
References | () http://www.securityfocus.com/bid/44214 - | |
References | () http://www.securitytracker.com/id?1024745 - | |
References | () http://www.ubuntu.com/usn/USN-1013-1 - | |
References | () http://www.vupen.com/english/advisories/2010/3037 - | |
References | () http://www.vupen.com/english/advisories/2011/0246 - | |
References | () https://savannah.nongnu.org/bugs/?31310 - |
Information
Published : 2010-11-26 20:00
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3855
Mitre link : CVE-2010-3855
CVE.ORG link : CVE-2010-3855
JSON object : View
Products Affected
freetype
- freetype
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer