Vulnerability Name:

CVE-2007-2754 (CCN-34431)

Assigned:2007-04-27
Published:2007-04-27
Updated:2023-02-13
Summary:Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: MITRE
Type: CNA
CVE-2007-2754

Source: MITRE
Type: CNA
CVE-2007-3408

Source: secalert@redhat.com
Type: Patch
secalert@redhat.com

Source: CCN
Type: Apple Web site
About the security content of Safari 3 Beta Update 3.0.4

Source: CCN
Type: Freetype Web site
The Freetype Project

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: ft-devel Mailing List, Fri, 27 Apr 2007 17:03:02 +0200
Bug in fuzzed TTF file

Source: secalert@redhat.com
Type: Exploit
secalert@redhat.com

Source: CCN
Type: RHSA-2007-0403
Moderate: freetype security update

Source: CCN
Type: RHSA-2009-0329
Important: freetype security update

Source: CCN
Type: RHSA-2009-1062
Important: freetype security update

Source: CCN
Type: SA25350
FreeType TTF Font Parsing Vulnerability

Source: CCN
Type: SA25705
Sun StarOffice Office Suite RTF File and FreeType Font Parsing Vulnerabilities

Source: CCN
Type: SA25810
Dia FreeType Font Parsing Vulnerabilities

Source: CCN
Type: SA26305
Avaya Products FreeType TTF Font Parsing Vulnerability

Source: CCN
Type: SA28298
Sun Solaris FreeType TTF Font Parsing Vulnerability

Source: CCN
Type: SA30161
Gentoo ltsp Multiple Vulnerabilities

Source: CCN
Type: SA35074
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: CCN
Type: SECTRACK ID: 1018088
FreeType Integer Overflow in TT_Load_Simple_Glyph() Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: SourceForge.net: Files
dia Win32 Installer - File Release Notes and Changelog - Release Name: 0.96.1-6

Source: CCN
Type: Sun Alert ID: 102967
Integer Overflow and Heap-Based Buffer Overflow Vulnerability in 3rd Party Module (Freetype)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Sun Alert ID: 103171
Security Vulnerability in FreeType 2 Font Engine May Allow Privilege Escalation Due to Heap Overflow

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: ASA-2007-273
Integer Overflow and Heap-Based Buffer Overflow Vulnerability in 3rd Party Module (Freetype) (Sun 102967)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: ASA-2007-330
FreeType security update (RHSA-2007-0403)

Source: CCN
Type: ASA-2008-029
Security Vulnerability in FreeType 2 Font Engine May Allow Privilege Escalation Due to Heap Overflow (Sun 103171)

Source: CCN
Type: ASA-2009-226
freetype security update (RHSA-2009-0329)

Source: CCN
Type: ASA-2009-243
freetype security update (RHSA-2009-1062)

Source: CCN
Type: Nortel Technical Support Security Advisory Bulletin 2008008603, Rev 1
Nortel response to Sun Solaris Vulnerability in FreeType 2 Font Engine

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: DEBIAN
Type: DSA-1302
freetype -- integer overflow

Source: DEBIAN
Type: DSA-1334
freetype -- integer overflow

Source: CCN
Type: GLSA-200705-22
FreeType: Buffer overflow

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-200707-02
OpenOffice.org: Two buffer overflows

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-200805-07
Linux Terminal Server Project: Multiple vulnerabilities

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-201006-01
FreeType 1: User-assisted execution of arbitrary code

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: OpenPKG-SA-2007.018
FreeType

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: OSVDB ID: 36509
FreeType truetype/ttgload.c TTF Image Handling Overflow

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-24074
FreeType TT_Load_Simple_Glyph() TTF File Integer Overflow Vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: USN-466-1
freetype vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: US Government Resource
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla Bug 240200
CVE-2007-2754 freetype integer overflow

Source: secalert@redhat.com
Type: Exploit
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
freetype-ttgload-bo(34431)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: SUSE
Type: SUSE-SA:2007:041
freetype2 security problem

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20072754
    V
    CVE-2007-2754
    2015-11-16
    oval:org.mitre.oval:def:18574
    P
    DSA-1302-1 freetype - integer overflow
    2014-06-23
    oval:org.mitre.oval:def:21823
    P
    ELSA-2007:0403: freetype security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:11325
    V
    Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
    2013-04-29
    oval:com.redhat.rhsa:def:20090329
    P
    RHSA-2009:0329: freetype security update (Important)
    2009-05-22
    oval:org.mitre.oval:def:5532
    V
    Security Vulnerability in FreeType 2 Font Engine May Allow Privilege Escalation Due to Heap Overflow
    2008-02-25
    oval:com.redhat.rhsa:def:20070403
    P
    RHSA-2007:0403: freetype security update (Moderate)
    2007-06-11
    oval:org.debian:def:1302
    V
    integer overflow
    2007-06-10
    BACK