Lucene search

K
cve[email protected]CVE-2010-1797
HistoryAug 16, 2010 - 6:39 p.m.

CVE-2010-1797

2010-08-1618:39:40
CWE-119
web.nvd.nist.gov
64
cve
buffer overflow
freetype
cff
ios
pdf
jailbreakme

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

High

0.513 Medium

EPSS

Percentile

97.6%

Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.

Affected configurations

NVD
Node
appleiphone_osMatch1.0.0
OR
appleiphone_osMatch1.0.1
OR
appleiphone_osMatch1.0.1-iphone
OR
appleiphone_osMatch1.0.2
OR
appleiphone_osMatch1.0.2-iphone
OR
appleiphone_osMatch1.1.0
OR
appleiphone_osMatch1.1.0-iphone
OR
appleiphone_osMatch1.1.0-ipodtouch
OR
appleiphone_osMatch1.1.1
OR
appleiphone_osMatch1.1.1-iphone
OR
appleiphone_osMatch1.1.2
OR
appleiphone_osMatch1.1.2-iphone
OR
appleiphone_osMatch1.1.2-ipodtouch
OR
appleiphone_osMatch1.1.3
OR
appleiphone_osMatch1.1.3-iphone
OR
appleiphone_osMatch1.1.3-ipodtouch
OR
appleiphone_osMatch1.1.4
OR
appleiphone_osMatch1.1.4-iphone
OR
appleiphone_osMatch1.1.4-ipodtouch
OR
appleiphone_osMatch1.1.5
OR
appleiphone_osMatch1.1.5-iphone
OR
appleiphone_osMatch1.1.5-ipodtouch
OR
appleiphone_osMatch2.0
OR
appleiphone_osMatch2.0.0
OR
appleiphone_osMatch2.0.0-iphone
OR
appleiphone_osMatch2.0.0-ipodtouch
OR
appleiphone_osMatch2.0.1
OR
appleiphone_osMatch2.0.1-iphone
OR
appleiphone_osMatch2.0.1-ipodtouch
OR
appleiphone_osMatch2.0.2
OR
appleiphone_osMatch2.0.2-iphone
OR
appleiphone_osMatch2.0.2-ipodtouch
OR
appleiphone_osMatch2.1
OR
appleiphone_osMatch2.1-iphone
OR
appleiphone_osMatch2.1-ipodtouch
OR
appleiphone_osMatch2.1.1
OR
appleiphone_osMatch2.2
OR
appleiphone_osMatch2.2-iphone
OR
appleiphone_osMatch2.2.1
OR
appleiphone_osMatch2.2.1-iphone
OR
appleiphone_osMatch2.2.1-ipodtouch
OR
appleiphone_osMatch3.0
OR
appleiphone_osMatch3.0-iphone
OR
appleiphone_osMatch3.0-ipodtouch
OR
appleiphone_osMatch3.0.1
OR
appleiphone_osMatch3.0.1-ipodtouch
OR
appleiphone_osMatch3.1
OR
appleiphone_osMatch3.1-iphone
OR
appleiphone_osMatch3.1-ipodtouch
OR
appleiphone_osMatch3.1.2
OR
appleiphone_osMatch3.1.2-iphone
OR
appleiphone_osMatch3.1.2-ipodtouch
OR
appleiphone_osMatch3.1.3
OR
appleiphone_osMatch3.1.3-iphone
OR
appleiphone_osMatch3.2
OR
appleiphone_osMatch3.2-iphone
OR
appleiphone_osMatch3.2-ipodtouch
OR
appleiphone_osMatch3.2.1
OR
appleiphone_osMatch3.2.1-ipad
OR
appleiphone_osMatch4.0
OR
appleiphone_osMatch4.0-iphone
OR
appleiphone_osMatch4.0-ipodtouch
OR
appleiphone_osMatch4.0.1
OR
appleiphone_osMatch4.0.1-iphone
OR
appleiphone_osMatch4.0.1-ipodtouch

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

High

0.513 Medium

EPSS

Percentile

97.6%