Think you have a false positive on this rule?

Sid 1-43677

Message

FILE-PDF FreeType PostScript Type1 font parsing memory corruption attempt

Summary

Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.

Impact

CVSS base score 9.3 CVSS impact score 10.0 CVSS exploitability score 8.6 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE

CVE-2011-0226:

CVSS base score 9.3

CVSS impact score 10.0

CVSS exploitability score 8.6

Confidentiality Impact COMPLETE

Integrity Impact COMPLETE

Availability Impact COMPLETE

Detailed information

CVE-2011-0226: Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.

Affected systems

  • freetype freetype 2.2.1
  • freetype freetype 2.2.10
  • freetype freetype 2.3.0
  • freetype freetype 2.3.1
  • freetype freetype 2.3.2
  • freetype freetype 2.3.3
  • freetype freetype 2.3.4
  • freetype freetype 2.3.5
  • freetype freetype 2.3.6
  • freetype freetype 2.3.7
  • freetype freetype 2.3.8
  • freetype freetype 2.3.9
  • freetype freetype 2.3.10
  • freetype freetype 2.3.11
  • freetype freetype 2.3.12
  • freetype freetype 2.4.0
  • freetype freetype 2.4.1
  • freetype freetype 2.4.2
  • freetype freetype 2.4.3
  • freetype freetype 2.4.4
  • freetype freetype 2.4.5
  • apple iphone_os 1.0.0
  • apple iphone_os 1.0.1
  • apple iphone_os 1.0.2
  • apple iphone_os 1.1.0
  • apple iphone_os 1.1.1
  • apple iphone_os 1.1.2
  • apple iphone_os 1.1.3
  • apple iphone_os 1.1.4
  • apple iphone_os 1.1.5
  • apple iphone_os 2.0
  • apple iphone_os 2.0.0
  • apple iphone_os 2.0.1
  • apple iphone_os 2.0.2
  • apple iphone_os 2.1
  • apple iphone_os 2.1.1
  • apple iphone_os 2.2
  • apple iphone_os 2.2.1
  • apple iphone_os 3.0
  • apple iphone_os 3.0.1
  • apple iphone_os 3.1
  • apple iphone_os 3.1.2
  • apple iphone_os 3.1.3
  • apple iphone_os 3.2
  • apple iphone_os 3.2.1
  • apple iphone_os 3.2.2
  • apple iphone_os 4.0
  • apple iphone_os 4.0.1
  • apple iphone_os 4.0.2
  • apple iphone_os 4.1
  • apple iphone_os 4.2
  • apple iphone_os 4.2.1
  • apple iphone_os 4.2.5
  • apple iphone_os 4.2.8
  • apple iphone_os 4.3.0
  • apple iphone_os 4.3.1
  • apple iphone_os 4.3.2
  • apple iphone_os 4.3.3

Ease of attack

CVE-2011-0226:

Access Vector NETWORK

Access Complexity MEDIUM

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References