Page 14 of 92 results (0.007 seconds)

CVSS: 6.8EPSS: 16%CPEs: 33EXPL: 0

Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font. Desbordamiento de búfer basado en memoria dinámica en la función Ins_SHZ en ttinterp.c en FreeType v2.4.3 y anteriores permite a atacantes remotos ejecutar código a su o elección y causar una denegación de servicio (cuelgue de aplicación) a través de una instrucción SHZ bytecode manipulada, relacionados con opcodes TrueType, como lo demuestra un documento PDF con una fuente manipulada incrustada. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4 http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html http://secunia.com/advisories/42314 http://secunia.com/advisories/43138 http://secunia.com/advisories/48951 http://security-tracker.debian.org/tracker/CVE-2010-3814 http://support.apple • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 17%CPEs: 32EXPL: 0

Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font. Desbordamiento de búfer en la función ft_var_readpackedpoints en truetype/ttgxvar.c en FreeType v2.4.3 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código arbitrario a través de una fuente TrueType GX manipulada. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html http://lists.apple.com/archives/s • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 9.3EPSS: 5%CPEs: 29EXPL: 0

Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797. Desbordamiento de enteros en base/ftstream.c en libXft (también conocida como la librería FreeType X) en FreeType anterior a v2.4 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código arbitrario mediante un archivo de Formato de Fuente Compacto (CFF) manipulado que provoca un desbordamiento de búfer basado en memoria dinámica, relacionado con un "error de posición en el flujo de entrada", una vulnerabilidad diferente de CVE-2010-1797. • http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://secunia.com/advisories/48951 http://www.debian.org/security/2010/dsa-2116 http://www.mandriva.com/security/advisories?name=MDVSA-2010:201 http://www.redhat.com/support/errata/RHSA-2010-0864.html http://www.securityfocus.com/bid/43700 http://www.ubuntu.com/usn/USN-1013-1 https://bugzilla.redhat.com/show_bug.cgi?id=623625 https://rhn.redhat.com/errata/RHSA-2010-0736.html https://rhn.re • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 30%CPEs: 30EXPL: 0

bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string. bdf/bdflib.c en FreeType en versiones anteriores a la 2.4.2 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) mediante una fichero de fuentes BDF modificado, relacionado con un intento de modificación de un valor en una cadena estática. • http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://secunia.com/advisories/42314 http://secunia.com/advisories/42317 http://secunia.com/advisories/48951 http://support.apple.com/kb/HT4435 http://support.apple.com/kb/HT4456 http://support.apple.com/kb/HT4457 http://www.vupen.com/english/advisories • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 9%CPEs: 6EXPL: 0

Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c. Vulnerabilidad no especificada en FreeType 2.3.9 y otras versiones anteriores a la 2.4.2, permite a atacantes remotos provocar una denegación de servicio mediante vectores involucrados en llamadas anidadas Standard Encoding Accented Character (también conocido como seac), relacionadas con psaux.h, cffgload.c, cffgload.h y t1decode.c. • http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://secunia.com/advisories/42314 http://secunia.com/advisories/42317 http://secunia.com/advisories/48951 http://support.apple.com/kb/HT4435 http://support.apple.com/kb/HT4456 http://support.apple.com/kb/HT4457 http://www.securityfocus.com/bid/42621 •