CVE-2010-2498
freetype: invalid free vulnerability with possible heap corruption
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
La función psh_glyph_find_strong_points en pshinter/pshalgo.c de FreeType anterior a v2.4.0 no implementa adecuadamente mascaras sugeridas, lo cual permite a atacantes remotos causar una denegación de servicio (corrupción en la pila de memoria y fallo de la aplicación) o posiblemente ejecutar código a su elección a través de ficheros de fuentes manipulados que provocan una operación libre no válida.
Multiple integer underflows/overflows and heap buffer overflows was discovered and fixed. A heap buffer overflow was discovered in the bytecode support. The bytecode support is NOT enabled per default in Mandriva due to previous patent claims, but packages by PLF is affected. The updated packages have been patched to correct these issues.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-06-28 CVE Reserved
- 2010-07-15 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html | Mailing List | |
http://marc.info/?l=oss-security&m=127905701201340&w=2 | Mailing List | |
http://marc.info/?l=oss-security&m=127909326909362&w=2 | Mailing List | |
http://secunia.com/advisories/48951 | Third Party Advisory | |
http://securitytracker.com/id?1024266 | Third Party Advisory | |
http://support.apple.com/kb/HT4435 | Broken Link |
|
URL | Date | SRC |
---|---|---|
https://savannah.nongnu.org/bugs/?30106 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2 | 2021-04-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=613160 | 2010-07-30 |
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | 2021-04-06 | |
http://www.debian.org/security/2010/dsa-2070 | 2021-04-06 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:137 | 2021-04-06 | |
http://www.redhat.com/support/errata/RHSA-2010-0578.html | 2021-04-06 | |
http://www.ubuntu.com/usn/USN-963-1 | 2021-04-06 | |
https://access.redhat.com/security/cve/CVE-2010-2498 | 2010-07-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freetype Search vendor "Freetype" | Freetype Search vendor "Freetype" for product "Freetype" | < 2.4.0 Search vendor "Freetype" for product "Freetype" and version " < 2.4.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 6.06 Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 8.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 9.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "9.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 9.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "9.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | < 10.6.5 Search vendor "Apple" for product "Mac Os X" and version " < 10.6.5" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|