Vulnerability Details : CVE-2010-3814
Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-3814
Probability of exploitation activity in the next 30 days: 16.03%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3814
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2010-3814
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3814
-
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
Apple - Lists.apple.comVendor Advisory
-
http://support.apple.com/kb/HT4581
About the security content of Mac OS X v10.6.7 and Security Update 2011-001 - Apple Support
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
mandriva.com
-
http://support.apple.com/kb/HT4456
About the security content of iOS 4.2 - Apple SupportVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0246
Webmail | OVH- OVH
-
http://www.ubuntu.com/usn/USN-1013-1
USN-1013-1: FreeType vulnerabilities | Ubuntu security notices
-
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4
freetype/freetype2.git - The FreeType 2 library
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
#602221 - freetype: CVE-2010-3855 and CVE-2010-3814 - Debian Bug report logs
-
http://www.vupen.com/english/advisories/2010/3046
Webmail | OVH- OVH
-
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
Apple - Lists.apple.com
-
http://www.securitytracker.com/id?1024767
FreeType Heap Overflow in Processing TrueType Fonts Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.securityfocus.com/bid/44643
FreeType TrueType Font Handling 'ttinterp.c' Remote Code Execution Vulnerability
-
http://security-tracker.debian.org/tracker/CVE-2010-3814
CVE-2010-3814
-
http://www.debian.org/security/2011/dsa-2155
Debian -- Security Information -- DSA-2155-1 freetype
Products affected by CVE-2010-3814
- cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*