Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-239r-933r-8pjv

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.

FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.

Ссылки

EPSS

Процентиль: 90%
0.05336
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.

redhat
около 17 лет назад

FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.

nvd
около 17 лет назад

FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.

debian
около 17 лет назад

FreeType2 before 2.3.6 allow context-dependent attackers to execute ar ...

oracle-oval
около 17 лет назад

ELSA-2008-0556: freetype security update (IMPORTANT)

EPSS

Процентиль: 90%
0.05336
Низкий