Vulnerability Name: CVE-2010-2500 (CCN-60399) Assigned: 2010-06-09 Published: 2010-06-09 Updated: 2023-02-13 Summary: Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-190 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2010-2500 Source: secalert@redhat.com Type: Patch, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Release Notes, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisorysecalert@redhat.com Source: CCN Type: RHSA-2010-0577Important: freetype security update Source: CCN Type: RHSA-2010-0578Important: freetype security update Source: CCN Type: SA40586FreeType Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1024266FreeType 2 Font File Processing Errors Let Remote Users Execute Arbitrary Code Source: secalert@redhat.com Type: Third Party Advisory, VDB Entrysecalert@redhat.com Source: secalert@redhat.com Type: Broken Linksecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: DEBIAN Type: DSA-2070freetype -- several vulnerabilities Source: CCN Type: FreeType Web siteFreeType Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: CCN Type: OSVDB ID: 66465FreeType smooth/ftgray.c gray_render_span Function Overflow Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: CCN Type: BID-41663FreeType Versions Prior to 2.4.0 Multiple Remote Vulnerabilities Source: CCN Type: Swiecki Web siteProjects Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisorysecalert@redhat.com Source: XF Type: UNKNOWNfreetype-ftgrays-bo(60399) Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisorysecalert@redhat.com Source: SUSE Type: SUSE-SR:2010:016SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:freetype:freetype:2.3.3:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.0.6:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.0.9:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.10:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.3:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.4:-:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.5:-:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.2.0:-:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.9:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.3.4:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.7:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.6:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.1.8:-:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.2.10:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.2.1:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.3.5:*:*:*:*:*:*:* OR cpe:/a:freetype:freetype:2.3.9:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:* OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
freetype freetype 2.3.3
freetype freetype 2.0.6
freetype freetype 2.0.9
freetype freetype 2.1
freetype freetype 2.1.10
freetype freetype 2.1.3
freetype freetype 2.1.4
freetype freetype 2.1.5
freetype freetype 2.2
freetype freetype 2.1.9
freetype freetype 2.3.4
freetype freetype 2.1.7
freetype freetype 2.1.6
freetype freetype 2.1.8 rc1
freetype freetype 2.1.8
freetype freetype 2.2.10
freetype freetype 2.2.1
freetype freetype 2.3.5
freetype freetype 2.3.9
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010