Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1806

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-16 Jun, 2008 | 19:00
Updated At-07 Aug, 2024 | 08:32
Rejected At-
Credits

Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:16 Jun, 2008 | 19:00
Updated At:07 Aug, 2024 | 08:32
Rejected At:
▼CVE Numbering Authority (CNA)

Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/archive/1/495497/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/33937
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1876/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30721
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
vendor-advisory
x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31712
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31709
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
vdb-entry
signature
x_refsource_OVAL
http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
x_refsource_MISC
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
http://secunia.com/advisories/30740
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT3438
x_refsource_CONFIRM
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
third-party-advisory
x_refsource_IDEFENSE
http://security.gentoo.org/glsa/glsa-200806-10.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/30766
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31479
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
http://www.vupen.com/english/advisories/2008/2423
vdb-entry
x_refsource_VUPEN
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
http://secunia.com/advisories/30967
third-party-advisory
x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
vendor-advisory
x_refsource_SUNALERT
https://issues.rpath.com/browse/RPL-2608
x_refsource_CONFIRM
http://secunia.com/advisories/30821
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
vendor-advisory
x_refsource_FEDORA
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
http://secunia.com/advisories/31856
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/31711
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0556.html
vendor-advisory
x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
vendor-advisory
x_refsource_SUSE
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
x_refsource_CONFIRM
http://www.securityfocus.com/bid/29640
vdb-entry
x_refsource_BID
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
http://www.vupen.com/english/advisories/2008/1794
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30600
third-party-advisory
x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
x_refsource_CONFIRM
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30819
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31707
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
http://securitytracker.com/id?1020238
vdb-entry
x_refsource_SECTRACK
http://www.ubuntu.com/usn/usn-643-1
vendor-advisory
x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2008-0558.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/31577
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/495497/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/33937
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/1876/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30721
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31712
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31709
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
Resource:
x_refsource_MISC
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30740
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT3438
Resource:
x_refsource_CONFIRM
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
Resource:
third-party-advisory
x_refsource_IDEFENSE
Hyperlink: http://security.gentoo.org/glsa/glsa-200806-10.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/30766
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31479
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.vupen.com/english/advisories/2008/2423
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30967
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: https://issues.rpath.com/browse/RPL-2608
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30821
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31856
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/31711
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0556.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/29640
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.vupen.com/english/advisories/2008/1794
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30600
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30819
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31707
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://securitytracker.com/id?1020238
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.ubuntu.com/usn/usn-643-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0558.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/31577
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/archive/1/495497/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://security.gentoo.org/glsa/glsa-201209-25.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/33937
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/1876/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30721
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.vupen.com/english/advisories/2008/2525
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31712
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31709
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
x_refsource_MISC
x_transferred
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30740
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT3438
x_refsource_CONFIRM
x_transferred
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
third-party-advisory
x_refsource_IDEFENSE
x_transferred
http://security.gentoo.org/glsa/glsa-200806-10.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/30766
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31479
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.vupen.com/english/advisories/2008/2423
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30967
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
https://issues.rpath.com/browse/RPL-2608
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30821
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT3026
x_refsource_CONFIRM
x_transferred
http://support.apple.com/kb/HT3129
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31856
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/31711
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0556.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/29640
vdb-entry
x_refsource_BID
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.vupen.com/english/advisories/2008/1794
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31823
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2558
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30600
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31900
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30819
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31707
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://securitytracker.com/id?1020238
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.ubuntu.com/usn/usn-643-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0558.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/31577
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495497/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/33937
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1876/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30721
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31712
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31709
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30740
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT3438
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
Resource:
third-party-advisory
x_refsource_IDEFENSE
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200806-10.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/30766
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31479
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2423
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30967
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-2608
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30821
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT3026
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/kb/HT3129
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31856
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/31711
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0556.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/29640
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1794
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31823
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30600
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31900
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30819
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31707
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://securitytracker.com/id?1020238
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-643-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0558.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/31577
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:16 Jun, 2008 | 19:41
Updated At:11 Oct, 2018 | 20:36

Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

freetype
freetype
>>freetype>>1.3.1
cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
freetype
freetype
>>freetype>>2.3.3
cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
freetype
freetype
>>freetype>>2.3.4
cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
freetype
freetype
>>freetype>>2.3.5
cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715cve@mitre.org
N/A
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.htmlcve@mitre.org
N/A
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.htmlcve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlcve@mitre.org
N/A
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlcve@mitre.org
N/A
http://secunia.com/advisories/30600cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/30721cve@mitre.org
N/A
http://secunia.com/advisories/30740cve@mitre.org
N/A
http://secunia.com/advisories/30766cve@mitre.org
N/A
http://secunia.com/advisories/30819cve@mitre.org
N/A
http://secunia.com/advisories/30821cve@mitre.org
N/A
http://secunia.com/advisories/30967cve@mitre.org
N/A
http://secunia.com/advisories/31479cve@mitre.org
N/A
http://secunia.com/advisories/31577cve@mitre.org
N/A
http://secunia.com/advisories/31707cve@mitre.org
N/A
http://secunia.com/advisories/31709cve@mitre.org
N/A
http://secunia.com/advisories/31711cve@mitre.org
N/A
http://secunia.com/advisories/31712cve@mitre.org
N/A
http://secunia.com/advisories/31823cve@mitre.org
N/A
http://secunia.com/advisories/31856cve@mitre.org
N/A
http://secunia.com/advisories/31900cve@mitre.org
N/A
http://secunia.com/advisories/33937cve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-200806-10.xmlcve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-201209-25.xmlcve@mitre.org
N/A
http://securitytracker.com/id?1020238cve@mitre.org
N/A
http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1cve@mitre.org
N/A
http://support.apple.com/kb/HT3026cve@mitre.org
N/A
http://support.apple.com/kb/HT3129cve@mitre.org
N/A
http://support.apple.com/kb/HT3438cve@mitre.org
N/A
http://support.avaya.com/elmodocs2/security/ASA-2008-318.htmcve@mitre.org
N/A
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2008:121cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0556.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0558.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/495497/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/495869/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/29640cve@mitre.org
Patch
http://www.ubuntu.com/usn/usn-643-1cve@mitre.org
N/A
http://www.vmware.com/security/advisories/VMSA-2008-0014.htmlcve@mitre.org
N/A
http://www.vmware.com/support/player/doc/releasenotes_player.htmlcve@mitre.org
N/A
http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlcve@mitre.org
N/A
http://www.vmware.com/support/server/doc/releasenotes_server.htmlcve@mitre.org
N/A
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlcve@mitre.org
N/A
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlcve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/1794cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/1876/referencescve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2423cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2466cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2525cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2558cve@mitre.org
N/A
https://issues.rpath.com/browse/RPL-2608cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.htmlcve@mitre.org
N/A
Hyperlink: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30600
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/30721
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30740
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30766
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30819
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30821
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30967
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31479
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31577
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31707
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31709
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31711
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31712
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31823
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31856
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31900
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33937
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200806-10.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-201209-25.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1020238
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3026
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3129
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3438
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0556.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0558.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/495497/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/29640
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.ubuntu.com/usn/usn-643-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1794
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1876/references
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2423
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2525
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2558
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-2608
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

59Records found

CVE-2008-1771
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.01% / 87.98%
||
7 Day CHG~0.00%
Published-16 Apr, 2008 | 15:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.

Action-Not Available
Vendor-fireflymediaservern/a
Product-fireflymediaservern/a
CWE ID-CWE-189
Not Available
CVE-2008-2376
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-14.26% / 94.13%
||
7 Day CHG~0.00%
Published-09 Jul, 2008 | 00:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

Action-Not Available
Vendor-n/aRubyRed Hat, Inc.
Product-rubyfedora_8n/a
CWE ID-CWE-189
Not Available
CVE-2008-2316
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.21% / 83.79%
||
7 Day CHG~0.00%
Published-01 Aug, 2008 | 14:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-189
Not Available
CVE-2008-0486
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.57% / 88.78%
||
7 Day CHG~0.00%
Published-05 Feb, 2008 | 11:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Array index vulnerability in libmpdemux/demux_audio.c in MPlayer 1.0rc2 and SVN before r25917, and possibly earlier versions, as used in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow.

Action-Not Available
Vendor-xinemplayern/a
Product-mplayerxine-libn/a
CWE ID-CWE-189
Not Available
CVE-2008-0986
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-13.76% / 94.02%
||
7 Day CHG~0.00%
Published-06 Mar, 2008 | 00:00
Updated-07 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.

Action-Not Available
Vendor-n/aGoogle LLC
Product-android_sdkn/a
CWE ID-CWE-189
Not Available
CVE-2007-6627
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.74% / 88.99%
||
7 Day CHG~0.00%
Published-04 Jan, 2008 | 00:00
Updated-07 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the RTSP_remove_msg function in RTSP_lowlevel.c in LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an RTP packet with a size value of 0xffff.

Action-Not Available
Vendor-fengn/a
Product-fengn/a
CWE ID-CWE-189
Not Available
CVE-2007-5713
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.92% / 75.04%
||
7 Day CHG~0.00%
Published-30 Oct, 2007 | 19:00
Updated-07 Aug, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the GeoIP module in the AMX Mod X 1.76d plugin for Half-Life Server might allow attackers to execute arbitrary code or cause a denial of service via unspecified input related to geolocation, which triggers an error message from the (1) geoip_code2 or (2) geoip_code3 function, leading to a buffer overflow.

Action-Not Available
Vendor-amxmodxvalve_softwaren/a
Product-half-life_dedicated_serveramx_mod_xn/a
CWE ID-CWE-189
Not Available
CVE-2007-4990
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.79% / 87.61%
||
7 Day CHG~0.00%
Published-05 Oct, 2007 | 21:00
Updated-07 Aug, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.

Action-Not Available
Vendor-n/aX.Org Foundation
Product-x_font_servern/a
CWE ID-CWE-189
Not Available
CVE-2007-4766
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.11% / 89.44%
||
7 Day CHG~0.00%
Published-07 Nov, 2007 | 20:00
Updated-07 Aug, 2024 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.

Action-Not Available
Vendor-pcren/a
Product-pcren/a
CWE ID-CWE-189
Not Available
  • Previous
  • 1
  • 2
  • Next
Details not found