Vulnerability Description
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freetype | Freetype | < 2.4.0 |
| Canonical | Ubuntu Linux | 6.06 |
| Apple | Mac Os X | < 10.6.5 |
| Debian | Debian Linux | 5.0 |
Related Weaknesses (CWE)
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935PatchThird Party Advisory
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlMailing ListThird Party Advisory
- http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.htmlMailing ListRelease NotesThird Party Advisory
- http://marc.info/?l=oss-security&m=127905701201340&w=2Mailing ListThird Party Advisory
- http://marc.info/?l=oss-security&m=127909326909362&w=2Mailing ListThird Party Advisory
- http://secunia.com/advisories/48951Third Party Advisory
- http://support.apple.com/kb/HT4435Broken Link
- http://www.debian.org/security/2010/dsa-2070Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:137Third Party Advisory
- http://www.ubuntu.com/usn/USN-963-1Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=613198Issue TrackingPatchThird Party Advisory
- https://savannah.nongnu.org/bugs/?30361ExploitIssue TrackingThird Party Advisory
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935PatchThird Party Advisory
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlMailing ListThird Party Advisory
- http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.htmlMailing ListRelease NotesThird Party Advisory
FAQ
What is CVE-2010-2520?
CVE-2010-2520 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (app...
How severe is CVE-2010-2520?
CVE-2010-2520 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-2520?
Check the references section above for vendor advisories and patch information. Affected products include: Freetype Freetype, Canonical Ubuntu Linux, Apple Mac Os X, Debian Debian Linux.