Описание
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.1.10-1ubuntu2.4 |
devel | released | 2.3.5-1ubuntu1 |
edgy | released | 2.2.1-5ubuntu0.2 |
feisty | released | 2.2.1-5ubuntu1.1 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | released | 2.3.0~rc1-1ubuntu1 |
edgy | not-affected | |
feisty | not-affected | |
upstream | needs-triage |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and e ...
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
ELSA-2007-0403: Moderate: freetype security update (MODERATE)
EPSS
6.8 Medium
CVSS2