Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2105-1 | New freetype packages fix several vulnerabilities |
Ubuntu USN |
USN-972-1 | FreeType vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apple
Published:
Updated: 2024-08-07T01:35:53.632Z
Reserved: 2010-05-06T00:00:00
Link: CVE-2010-1797
No data.
Status : Deferred
Published: 2010-08-16T18:39:40.403
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-1797
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN