CVE-2010-1797

Source
https://nvd.nist.gov/vuln/detail/CVE-2010-1797
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2010-1797.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2010-1797
Related
Published
2010-08-16T18:39:40Z
Modified
2024-11-21T01:15:13Z
Summary
[none]
Details

Multiple stack-based buffer overflows in the cffdecoderparse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.

References

Affected packages

Debian:11 / freetype

Package

Name
freetype
Purl
pkg:deb/debian/freetype?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / freetype

Package

Name
freetype
Purl
pkg:deb/debian/freetype?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / freetype

Package

Name
freetype
Purl
pkg:deb/debian/freetype?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}