Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
http://support.apple.com/kb/HT4292
http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
http://www.exploit-db.com/exploits/14538
http://secunia.com/advisories/40807
http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
http://support.apple.com/kb/HT4291
http://www.securityfocus.com/bid/42151
http://www.ubuntu.com/usn/USN-972-1
https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
http://www.vupen.com/english/advisories/2010/2106
http://www.vupen.com/english/advisories/2010/2018
http://www.f-secure.com/weblog/archives/00002002.html
http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
https://bugzilla.redhat.com/show_bug.cgi?id=621144
http://secunia.com/advisories/40816
http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
http://secunia.com/advisories/40982