CVE-2008-1808 : Détail

CVE-2008-1808

2.15%V3
Network
2008-06-16
17h00 +00:00
2018-10-11
17h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Products Mentioned

Configuraton 0

Freetype>>Freetype >> Version 1.3.1

Freetype>>Freetype >> Version 2.0.6

Freetype>>Freetype >> Version 2.0.9

Freetype>>Freetype >> Version 2.1.7

Freetype>>Freetype >> Version 2.1.9

Freetype>>Freetype >> Version 2.1.10

Freetype>>Freetype >> Version 2.2.0

Freetype>>Freetype >> Version 2.2.1

Freetype>>Freetype >> Version 2.2.10

    Freetype>>Freetype >> Version 2.3.3

    Freetype>>Freetype >> Version 2.3.4

    Freetype>>Freetype >> Version 2.3.5

    Références

    http://securitytracker.com/id?1020240
    Tags : vdb-entry, x_refsource_SECTRACK
    http://security.gentoo.org/glsa/glsa-201209-25.xml
    Tags : vendor-advisory, x_refsource_GENTOO
    http://secunia.com/advisories/33937
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://secunia.com/advisories/30721
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
    Tags : vendor-advisory, x_refsource_MANDRIVA
    http://www.vupen.com/english/advisories/2008/2525
    Tags : vdb-entry, x_refsource_VUPEN
    http://secunia.com/advisories/31712
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://secunia.com/advisories/31709
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://secunia.com/advisories/30740
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://support.apple.com/kb/HT3438
    Tags : x_refsource_CONFIRM
    http://security.gentoo.org/glsa/glsa-200806-10.xml
    Tags : vendor-advisory, x_refsource_GENTOO
    http://secunia.com/advisories/30766
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://secunia.com/advisories/31479
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.vupen.com/english/advisories/2008/2423
    Tags : vdb-entry, x_refsource_VUPEN
    http://secunia.com/advisories/30967
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
    Tags : vendor-advisory, x_refsource_SUNALERT
    http://secunia.com/advisories/30821
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://support.apple.com/kb/HT3026
    Tags : x_refsource_CONFIRM
    http://support.apple.com/kb/HT3129
    Tags : x_refsource_CONFIRM
    http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717
    Tags : third-party-advisory, x_refsource_IDEFENSE
    http://secunia.com/advisories/31856
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.securityfocus.com/bid/29639
    Tags : vdb-entry, x_refsource_BID
    http://secunia.com/advisories/31711
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.redhat.com/support/errata/RHSA-2008-0556.html
    Tags : vendor-advisory, x_refsource_REDHAT
    http://www.vupen.com/english/advisories/2008/1794
    Tags : vdb-entry, x_refsource_VUPEN
    http://secunia.com/advisories/31823
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.vupen.com/english/advisories/2008/2558
    Tags : vdb-entry, x_refsource_VUPEN
    http://secunia.com/advisories/30600
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://secunia.com/advisories/31900
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://secunia.com/advisories/30819
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://secunia.com/advisories/31707
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.redhat.com/support/errata/RHSA-2009-0329.html
    Tags : vendor-advisory, x_refsource_REDHAT
    http://www.ubuntu.com/usn/usn-643-1
    Tags : vendor-advisory, x_refsource_UBUNTU
    http://secunia.com/advisories/35204
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.redhat.com/support/errata/RHSA-2008-0558.html
    Tags : vendor-advisory, x_refsource_REDHAT
    http://secunia.com/advisories/31577
    Tags : third-party-advisory, x_refsource_SECUNIA
    http://www.vupen.com/english/advisories/2008/2466
    Tags : vdb-entry, x_refsource_VUPEN
    http://www.securityfocus.com/bid/29637
    Tags : vdb-entry, x_refsource_BID