CVE-2008-1808

Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
freetypefreetype
1.3.1
freetypefreetype
2.0.6
freetypefreetype
2.0.9
freetypefreetype
2.1.7
freetypefreetype
2.1.9
freetypefreetype
2.1.10
freetypefreetype
2.2.0
freetypefreetype
2.2.1
freetypefreetype
2.2.10
freetypefreetype
2.3.3
freetypefreetype
2.3.4
freetypefreetype
2.3.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freetype
bullseye
2.10.4+dfsg-1+deb11u1
fixed
bookworm
2.12.1+dfsg-5+deb12u3
fixed
sid
2.13.3+dfsg-1
fixed
trixie
2.13.3+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freetype
hardy
Fixed 2.3.5-1ubuntu4.8.04.1
released
gutsy
Fixed 2.3.5-1ubuntu4.7.10.1
released
feisty
Fixed 2.2.1-5ubuntu1.2
released
dapper
Fixed 2.1.10-1ubuntu2.5
released
Common Weakness Enumeration
References