Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
References
Link | Resource |
---|---|
http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2 | Release Notes Third Party Advisory |
http://secunia.com/advisories/40982 | Third Party Advisory |
http://secunia.com/advisories/48951 | Third Party Advisory |
http://securitytracker.com/id?1024266 | Third Party Advisory VDB Entry |
http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2010-0577.html | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2010-0578.html | Third Party Advisory |
http://www.ubuntu.com/usn/USN-972-1 | Third Party Advisory |
http://www.vupen.com/english/advisories/2010/2106 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019 | Issue Tracking Release Notes Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=617342 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
06 Apr 2021, 12:52
Type | Values Removed | Values Added |
---|---|---|
References | (UBUNTU) http://www.ubuntu.com/usn/USN-972-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/40982 - Third Party Advisory | |
References | (CONFIRM) http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view - Third Party Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0578.html - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/2106 - Third Party Advisory | |
References | (CONFIRM) http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2 - Release Notes, Third Party Advisory | |
References | (CONFIRM) https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019 - Issue Tracking, Release Notes, Third Party Advisory | |
References | (SECTRACK) http://securitytracker.com/id?1024266 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/48951 - Third Party Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0577.html - Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=617342 - Issue Tracking, Patch, Third Party Advisory | |
CWE | CWE-120 | |
CPE | cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:* cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* |
26 Jan 2021, 12:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freetype:freetype:2.1.8_rc1:*:*:*:*:*:*:* |
cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:* |
Information
Published : 2010-08-19 18:00
Updated : 2023-12-10 11:03
NVD link : CVE-2010-2541
Mitre link : CVE-2010-2541
CVE.ORG link : CVE-2010-2541
JSON object : View
Products Affected
canonical
- ubuntu_linux
freetype
- freetype
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')