Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-2754

Опубликовано: 17 мая 2007
Источник: debian
EPSS Средний

Описание

Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freetypefixed2.2.1-6package
freetypefixed2.1.7-8sargepackage

EPSS

Процентиль: 98%
0.4744
Средний

Связанные уязвимости

ubuntu
около 18 лет назад

Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.

redhat
около 18 лет назад

Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.

nvd
около 18 лет назад

Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.

github
около 3 лет назад

Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.

oracle-oval
около 18 лет назад

ELSA-2007-0403: Moderate: freetype security update (MODERATE)

EPSS

Процентиль: 98%
0.4744
Средний