Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-1808

Опубликовано: 10 июн. 2008
Источник: redhat
EPSS Низкий

Описание

Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.

Дополнительная информация

Статус:

Important
Дефект:
CWE-193

EPSS

Процентиль: 88%
0.0415
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.

nvd
около 17 лет назад

Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.

debian
около 17 лет назад

Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dep ...

github
около 3 лет назад

Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.

oracle-oval
около 17 лет назад

ELSA-2008-0556: freetype security update (IMPORTANT)

EPSS

Процентиль: 88%
0.0415
Низкий