CVE-2011-0226

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.

References

http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html

http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html

http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html

http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html

http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html

http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html

http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html

http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html

http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html

http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html

http://secunia.com/advisories/45167

http://secunia.com/advisories/45224

http://support.apple.com/kb/HT4802

http://support.apple.com/kb/HT4803

http://support.apple.com/kb/HT5002

http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html

http://www.debian.org/security/2011/dsa-2294

http://www.mandriva.com/security/advisories?name=MDVSA-2011:120

http://www.redhat.com/support/errata/RHSA-2011-1085.html

http://www.securityfocus.com/bid/48619

Details

Source: MITRE

Published: 2011-07-19

Updated: 2011-10-26

Type: CWE-189

Risk Information

CVSS v2

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
75844openSUSE Security Update : freetype2 (openSUSE-SU-2011:0852-1)NessusSuSE Local Security Checks
high
75506openSUSE Security Update : freetype2 (openSUSE-SU-2011:0852-1)NessusSuSE Local Security Checks
high
68311Oracle Linux 6 : freetype (ELSA-2011-1085)NessusOracle Linux Local Security Checks
high
61089Scientific Linux Security Update : freetype on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
high
57651GLSA-201201-09 : FreeType: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
6039Mac OS X 10.7 < 10.7.2 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
56480Mac OS X 10.7.x < 10.7.2 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
56016Fedora 14 : freetype-2.4.2-5.fc14 (2011-9525)NessusFedora Local Security Checks
high
55872Fedora 15 : freetype-2.4.4-5.fc15 (2011-9542)NessusFedora Local Security Checks
high
55852Debian DSA-2294-1 : freetype - missing input sanitisingNessusDebian Local Security Checks
high
55822FreeBSD : freetype2 -- execute arbitrary code or cause denial of service (5d374b01-c3ee-11e0-8aa5-485d60cb5385)NessusFreeBSD Local Security Checks
high
55712SuSE 11.1 Security Update : freetype2 (SAT Patch Number 4921)NessusSuSE Local Security Checks
high
55695Mandriva Linux Security Advisory : freetype2 (MDVSA-2011:120)NessusMandriva Local Security Checks
high
55688Ubuntu 10.10 / 11.04 : freetype vulnerability (USN-1173-1)NessusUbuntu Local Security Checks
high
55647RHEL 6 : freetype (RHSA-2011:1085)NessusRed Hat Local Security Checks
high
5986Apple iOS < 4.3.4 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
high