CVE-2009-0946

CVSS V2 High 7.5 CVSS V3 None
Description
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
Overview
  • CVE ID
  • CVE-2009-0946
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2009-04-17T00:30:00
  • Last Modified Date
  • 2021-04-05T19:25:44
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:* 1 OR 2.3.9
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* 1 OR 1.0.0 2.2.1
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR 10.6.0 10.6.4
cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* 1 OR 10.6.0 10.6.4
cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
https://bugzilla.redhat.com/show_bug.cgi?id=491384 Issue Tracking Patch Third Party Advisory
http://secunia.com/advisories/34723 Third Party Advisory
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b Patch Third Party Advisory
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 Patch Third Party Advisory
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e Patch Third Party Advisory
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog Release Notes Third Party Advisory
http://www.vupen.com/english/advisories/2009/1058 Third Party Advisory
http://www.securityfocus.com/bid/34550 Third Party Advisory VDB Entry
http://secunia.com/advisories/34913 Third Party Advisory
http://www.ubuntu.com/usn/USN-767-1 Third Party Advisory
http://secunia.com/advisories/34967 Third Party Advisory
http://www.debian.org/security/2009/dsa-1784 Third Party Advisory
http://secunia.com/advisories/35065 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html Mailing List Third Party Advisory
http://www.vupen.com/english/advisories/2009/1297 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA09-133A.html Third Party Advisory US Government Resource
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html Mailing List Third Party Advisory
http://secunia.com/advisories/35074 Third Party Advisory
http://support.apple.com/kb/HT3549 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1062.html Third Party Advisory
http://secunia.com/advisories/35200 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1061.html Third Party Advisory
http://secunia.com/advisories/35204 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-0329.html Third Party Advisory
http://secunia.com/advisories/35198 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200905-05.xml Third Party Advisory
http://secunia.com/advisories/35210 Third Party Advisory
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Broken Link
http://www.vupen.com/english/advisories/2009/1522 Third Party Advisory
http://support.apple.com/kb/HT3613 Third Party Advisory
http://secunia.com/advisories/35379 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1621 Third Party Advisory
http://support.apple.com/kb/HT3639 Third Party Advisory
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html Mailing List Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2009:243 Third Party Advisory
http://support.apple.com/kb/HT4435 Broken Link
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Mailing List Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 07:17:16 Added to TrackCVE