Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-0226 (GCVE-0-2011-0226)
Vulnerability from cvelistv5 – Published: 2011-07-19 22:00 – Updated: 2024-08-06 21:43- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:43:15.423Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "45224",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45224"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4803"
},
{
"name": "APPLE-SA-2011-07-15-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"name": "openSUSE-SU-2011:0852",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"name": "48619",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48619"
},
{
"name": "[freetype-devel] 20110709 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"name": "APPLE-SA-2011-07-15-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"name": "45167",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45167"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "RHSA-2011:1085",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4802"
},
{
"name": "[freetype-devel] 20110708 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"name": "SUSE-SU-2011:0853",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"name": "DSA-2294",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "MDVSA-2011:120",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"name": "[freetype-devel] 20110708 details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-08-23T09:00:00.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"name": "45224",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45224"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4803"
},
{
"name": "APPLE-SA-2011-07-15-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"name": "openSUSE-SU-2011:0852",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"name": "48619",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48619"
},
{
"name": "[freetype-devel] 20110709 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"name": "APPLE-SA-2011-07-15-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"name": "45167",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45167"
},
{
"name": "APPLE-SA-2011-10-12-3",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "RHSA-2011:1085",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4802"
},
{
"name": "[freetype-devel] 20110708 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"name": "SUSE-SU-2011:0853",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"name": "DSA-2294",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "MDVSA-2011:120",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"name": "[freetype-devel] 20110708 details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0226",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "45224",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45224"
},
{
"name": "http://support.apple.com/kb/HT4803",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4803"
},
{
"name": "APPLE-SA-2011-07-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"name": "openSUSE-SU-2011:0852",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"name": "48619",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48619"
},
{
"name": "[freetype-devel] 20110709 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"name": "APPLE-SA-2011-07-15-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"name": "45167",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45167"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "RHSA-2011:1085",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"name": "http://support.apple.com/kb/HT4802",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4802"
},
{
"name": "[freetype-devel] 20110708 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"name": "SUSE-SU-2011:0853",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"name": "DSA-2294",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "MDVSA-2011:120",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
},
{
"name": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html",
"refsource": "MISC",
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"name": "[freetype-devel] 20110708 details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2011-0226",
"datePublished": "2011-07-19T22:00:00.000Z",
"dateReserved": "2010-12-23T00:00:00.000Z",
"dateUpdated": "2024-08-06T21:43:15.423Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-0226",
"date": "2026-05-22",
"epss": "0.10653",
"percentile": "0.93397"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4.5\", \"matchCriteriaId\": \"22668317-72EF-41B9-9379-1AEC251C5F49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7252819-BA8A-4BD1-BAAA-179A8777C994\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B4450B4-B21F-4153-B9DD-C36A2381F00D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11575E3C-2BEA-4264-AE41-4A962BD17035\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D333A965-EAD2-40DB-8FBE-C4C7DF44C35C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CA37666-D2E6-47EF-BFFE-A9449D6A72CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2B49505-C973-4673-A9BC-34ACA25059D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8E8ECCA-58F2-4A05-8DF2-79C09A5FB275\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8697D11D-BBDF-4722-85F7-5144A5D26E37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50E3EDA8-04D1-4DF1-80BB-72C6003E8F53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB06CA25-BB25-43B8-9FC2-62C399CC52EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AF7414E-33A7-40E2-AEF0-1AE9D7D1B077\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FC0BD12-E065-4CC9-8AEE-E4C34A58EC3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"214DC64B-BA35-486B-AE30-F2D9381E4D26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7CDE19A-473A-4BC5-AA7B-3D08FEEEE82C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD8401A8-A328-49F6-BAE8-337F5F36C906\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FBF5BAA-8027-478F-BE06-3D3F4F823C7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31358B5D-4087-4207-9730-297BA47DAA83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A73E016-A4B0-416D-B9B6-786A787DAD3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0588BCE1-059B-4602-B274-E9D268720B55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D19BE9CC-6B1C-4AC8-9740-2ABDF40C4FEC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.2.8\", \"matchCriteriaId\": \"20E87ED9-A08D-48B2-83A8-AD2C0F6A22A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E28FB0CB-D636-4F85-B5F7-70EC30053925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27319629-171F-42AA-A95F-2D71F78097D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"297F9438-0F04-4128-94A8-A504B600929E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8618621-F871-4531-9F6C-7D60F2BF8B75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"824DED2D-FA1D-46FC-8252-6E25546DAE29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF40CDA4-4716-4815-9ED0-093FE266734C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25A5D868-0016-44AB-80E6-E5DF91F15455\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863383DA-0BC6-4A96-835A-A96128EC0202\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A20F171-79FE-43B9-8309-B18341639FA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"126EF22D-29BC-4366-97BC-B261311E6251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A939B80-0AD0-48AF-81A7-370716F56639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D28528CE-4943-4F82-80C0-A629DA3E6702\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"107C59BE-D8CF-4A17-8DFB-BED2AB12388D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36C86BB9-0328-4E34-BC2B-47B3471EC262\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1878949F-8E15-4751-8D8A-BFB2B9B9254A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A54A8681-2D8A-4B0B-A947-82F3CE1FB03C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0070D83-2E27-4DA8-8D10-A6A697216F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7252935C-E421-4339-B61F-0299E28888DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DD342BF-096A-4082-B700-19629F2BDE87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93141AB6-26F2-4C6D-95B3-D383EABB4034\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D5C61FF-7CD3-410A-94F2-5DE701466B1F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.\"}, {\"lang\": \"es\", \"value\": \"Error de entero sin signo en psaux/t1decode.c en FreeType anterior a v2.4.6, es usado enCoreGraphics en Apple iOS anterior a v4.2.9 y v4.3.x anterior a v4.3.4 y otros productos, permite a atacantes remotos ejecutar c\\u00f3digo de su elecci\\u00f3n o provocar una denegaci\\u00f3n de servicio (corrupci\\u00f3n de memoria o ca\\u00edda de la aplicaci\\u00f3n) a trav\\u00e9s de una fuente manipulada Type 1 en un documento PDF, como se explot\\u00f3 en Julio 2011.\"}]",
"id": "CVE-2011-0226",
"lastModified": "2024-11-21T01:23:35.317",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2011-07-19T22:55:00.820",
"references": "[{\"url\": \"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/45167\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45224\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4802\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4803\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT5002\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2294\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:120\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1085.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.securityfocus.com/bid/48619\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/45167\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45224\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4802\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4803\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT5002\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2294\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:120\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-1085.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/48619\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-0226\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2011-07-19T22:55:00.820\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.\"},{\"lang\":\"es\",\"value\":\"Error de entero sin signo en psaux/t1decode.c en FreeType anterior a v2.4.6, es usado enCoreGraphics en Apple iOS anterior a v4.2.9 y v4.3.x anterior a v4.3.4 y otros productos, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria o ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una fuente manipulada Type 1 en un documento PDF, como se explot\u00f3 en Julio 2011.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.5\",\"matchCriteriaId\":\"22668317-72EF-41B9-9379-1AEC251C5F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7252819-BA8A-4BD1-BAAA-179A8777C994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4450B4-B21F-4153-B9DD-C36A2381F00D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11575E3C-2BEA-4264-AE41-4A962BD17035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D333A965-EAD2-40DB-8FBE-C4C7DF44C35C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA37666-D2E6-47EF-BFFE-A9449D6A72CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2B49505-C973-4673-A9BC-34ACA25059D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E8ECCA-58F2-4A05-8DF2-79C09A5FB275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8697D11D-BBDF-4722-85F7-5144A5D26E37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E3EDA8-04D1-4DF1-80BB-72C6003E8F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB06CA25-BB25-43B8-9FC2-62C399CC52EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AF7414E-33A7-40E2-AEF0-1AE9D7D1B077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC0BD12-E065-4CC9-8AEE-E4C34A58EC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214DC64B-BA35-486B-AE30-F2D9381E4D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7CDE19A-473A-4BC5-AA7B-3D08FEEEE82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD8401A8-A328-49F6-BAE8-337F5F36C906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FBF5BAA-8027-478F-BE06-3D3F4F823C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31358B5D-4087-4207-9730-297BA47DAA83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A73E016-A4B0-416D-B9B6-786A787DAD3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0588BCE1-059B-4602-B274-E9D268720B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D19BE9CC-6B1C-4AC8-9740-2ABDF40C4FEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.8\",\"matchCriteriaId\":\"20E87ED9-A08D-48B2-83A8-AD2C0F6A22A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28FB0CB-D636-4F85-B5F7-70EC30053925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27319629-171F-42AA-A95F-2D71F78097D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297F9438-0F04-4128-94A8-A504B600929E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8618621-F871-4531-9F6C-7D60F2BF8B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824DED2D-FA1D-46FC-8252-6E25546DAE29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF40CDA4-4716-4815-9ED0-093FE266734C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A5D868-0016-44AB-80E6-E5DF91F15455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863383DA-0BC6-4A96-835A-A96128EC0202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20F171-79FE-43B9-8309-B18341639FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"126EF22D-29BC-4366-97BC-B261311E6251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A939B80-0AD0-48AF-81A7-370716F56639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28528CE-4943-4F82-80C0-A629DA3E6702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107C59BE-D8CF-4A17-8DFB-BED2AB12388D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36C86BB9-0328-4E34-BC2B-47B3471EC262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1878949F-8E15-4751-8D8A-BFB2B9B9254A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54A8681-2D8A-4B0B-A947-82F3CE1FB03C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0070D83-2E27-4DA8-8D10-A6A697216F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7252935C-E421-4339-B61F-0299E28888DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DD342BF-096A-4082-B700-19629F2BDE87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93141AB6-26F2-4C6D-95B3-D383EABB4034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5C61FF-7CD3-410A-94F2-5DE701466B1F\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/45167\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45224\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4802\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4803\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5002\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2294\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:120\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1085.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.securityfocus.com/bid/48619\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/45224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4803\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1085.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/48619\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2011-ALE-004
Vulnerability from certfr_alerte - Published: - Updated:
Deux vulnérabilités non corrigées ont été découvertes dans l'Apple iOS.
Description
Deux vulnérabilités ont été découvertes dans l'Apple iOS. La première concerne le traitement des fichiers au format PDF et permet l'exécution de code arbitraire à distance. La seconde est une vulnérabilité du noyau utilisable pour effectuer une élévation de privilèges. La combinaison des deux permet à une personne malintentionnée d'exécuter du code arbitraire à distance avec les droits administrateur et d'accéder ainsi à l'ensemble des informations (contacts, mails, documents ...) et ressources (caméra, micro, GPS...) de l'appareil. Des preuves de faisabilité circulent déjà sur l'Internet. Ces vulnérabilités sont, entre autre, utilisées pour effectuer le Jailbreak.
Contournement provisoire
En attendant le correctif d'Apple, il est recommandé la plus grande prudence lors de l'ouverture de fichiers au format PDF, par exemple en n'ouvrant que des fichiers attendus ou en validant la légitimité du message auprès de l'envoyeur.
Solution
Se référer au bulletin de sécurité Apple HT4802 et HT4803 pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPod Touch 2G, 3G et 4G avec iOS versions 4.3.3 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPhone 4, 3GS et 3G avec iOS versions 4.3.3 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPad 1G et 2 avec iOS versions 4.3.3 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2011-07-18",
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans l\u0027Apple iOS. La premi\u00e8re\nconcerne le traitement des fichiers au format PDF et permet l\u0027ex\u00e9cution\nde code arbitraire \u00e0 distance. La seconde est une vuln\u00e9rabilit\u00e9 du noyau\nutilisable pour effectuer une \u00e9l\u00e9vation de privil\u00e8ges. La combinaison\ndes deux permet \u00e0 une personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance avec les droits administrateur et d\u0027acc\u00e9der ainsi\n\u00e0 l\u0027ensemble des informations (contacts, mails, documents ...) et\nressources (cam\u00e9ra, micro, GPS...) de l\u0027appareil. Des preuves de\nfaisabilit\u00e9 circulent d\u00e9j\u00e0 sur l\u0027Internet. Ces vuln\u00e9rabilit\u00e9s sont,\nentre autre, utilis\u00e9es pour effectuer le Jailbreak.\n\n## Contournement provisoire\n\nEn attendant le correctif d\u0027Apple, il est recommand\u00e9 la plus grande\nprudence lors de l\u0027ouverture de fichiers au format PDF, par exemple en\nn\u0027ouvrant que des fichiers attendus ou en validant la l\u00e9gitimit\u00e9 du\nmessage aupr\u00e8s de l\u0027envoyeur.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple HT4802 et HT4803 pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3855"
},
{
"name": "CVE-2011-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0227"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4802 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4802"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4803 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4803"
}
],
"reference": "CERTA-2011-ALE-004",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-07-05T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins Apple et aux CVE.",
"revision_date": "2011-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s non corrig\u00e9es ont \u00e9t\u00e9 d\u00e9couvertes dans l\u0027Apple iOS.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": []
}
CERTA-2011-ALE-004
Vulnerability from certfr_alerte - Published: - Updated:
Deux vulnérabilités non corrigées ont été découvertes dans l'Apple iOS.
Description
Deux vulnérabilités ont été découvertes dans l'Apple iOS. La première concerne le traitement des fichiers au format PDF et permet l'exécution de code arbitraire à distance. La seconde est une vulnérabilité du noyau utilisable pour effectuer une élévation de privilèges. La combinaison des deux permet à une personne malintentionnée d'exécuter du code arbitraire à distance avec les droits administrateur et d'accéder ainsi à l'ensemble des informations (contacts, mails, documents ...) et ressources (caméra, micro, GPS...) de l'appareil. Des preuves de faisabilité circulent déjà sur l'Internet. Ces vulnérabilités sont, entre autre, utilisées pour effectuer le Jailbreak.
Contournement provisoire
En attendant le correctif d'Apple, il est recommandé la plus grande prudence lors de l'ouverture de fichiers au format PDF, par exemple en n'ouvrant que des fichiers attendus ou en validant la légitimité du message auprès de l'envoyeur.
Solution
Se référer au bulletin de sécurité Apple HT4802 et HT4803 pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPod Touch 2G, 3G et 4G avec iOS versions 4.3.3 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPhone 4, 3GS et 3G avec iOS versions 4.3.3 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPad 1G et 2 avec iOS versions 4.3.3 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2011-07-18",
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans l\u0027Apple iOS. La premi\u00e8re\nconcerne le traitement des fichiers au format PDF et permet l\u0027ex\u00e9cution\nde code arbitraire \u00e0 distance. La seconde est une vuln\u00e9rabilit\u00e9 du noyau\nutilisable pour effectuer une \u00e9l\u00e9vation de privil\u00e8ges. La combinaison\ndes deux permet \u00e0 une personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance avec les droits administrateur et d\u0027acc\u00e9der ainsi\n\u00e0 l\u0027ensemble des informations (contacts, mails, documents ...) et\nressources (cam\u00e9ra, micro, GPS...) de l\u0027appareil. Des preuves de\nfaisabilit\u00e9 circulent d\u00e9j\u00e0 sur l\u0027Internet. Ces vuln\u00e9rabilit\u00e9s sont,\nentre autre, utilis\u00e9es pour effectuer le Jailbreak.\n\n## Contournement provisoire\n\nEn attendant le correctif d\u0027Apple, il est recommand\u00e9 la plus grande\nprudence lors de l\u0027ouverture de fichiers au format PDF, par exemple en\nn\u0027ouvrant que des fichiers attendus ou en validant la l\u00e9gitimit\u00e9 du\nmessage aupr\u00e8s de l\u0027envoyeur.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple HT4802 et HT4803 pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3855"
},
{
"name": "CVE-2011-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0227"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4802 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4802"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4803 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4803"
}
],
"reference": "CERTA-2011-ALE-004",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-07-05T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins Apple et aux CVE.",
"revision_date": "2011-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s non corrig\u00e9es ont \u00e9t\u00e9 d\u00e9couvertes dans l\u0027Apple iOS.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": []
}
CERTA-2011-AVI-395
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans Apple iOS permettent à une personne distante malintentionnée d'exécuter du code arbitraire et d'élever ses privilèges sur le système.
Description
Plusieurs vulnérabilités ont été découvertes dans Apple iOS :
- deux vulnérabilités dans la gestion de certaines polices de caractères FreeType permettent à une personne distante malintentionnée d'exécuter du code arbitraire via un fichier PDF spécialement conçu (CVE-2010-3855 et CVE-2011-0226) ;
- une erreur de conversion dans l'utilisation de primitives de gestion de queue d'IOMobileFrameBuffer permet à une personne malintentionnée d'élever ses privilèges sur le système vulnérable (CVE-2011-0227).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | Apple iOS versions 3.1 à 4.3.3 pour iPod touch de 3ème génération et postérieures ; | ||
| Apple | N/A | Apple iOS versions 3.0 à 4.3.3 pour iPhone 3GS et iPhone 4 modèle GSM ; | ||
| Apple | N/A | Apple iOS versions 3.2 à 4.3.3 pour iPad. | ||
| Apple | N/A | Apple iOS versions 4.2.5 à 4.2.8 pour iPhone 4 modèle CDMA ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple iOS versions 3.1 \u00e0 4.3.3 pour iPod touch de 3\u00e8me g\u00e9n\u00e9ration et post\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions 3.0 \u00e0 4.3.3 pour iPhone 3GS et iPhone 4 mod\u00e8le GSM ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions 3.2 \u00e0 4.3.3 pour iPad.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions 4.2.5 \u00e0 4.2.8 pour iPhone 4 mod\u00e8le CDMA ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apple iOS :\n\n- deux vuln\u00e9rabilit\u00e9s dans la gestion de certaines polices de\n caract\u00e8res FreeType permettent \u00e0 une personne distante\n malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire via un fichier PDF\n sp\u00e9cialement con\u00e7u (CVE-2010-3855 et CVE-2011-0226) ;\n- une erreur de conversion dans l\u0027utilisation de primitives de gestion\n de queue d\u0027IOMobileFrameBuffer permet \u00e0 une personne malintentionn\u00e9e\n d\u0027\u00e9lever ses privil\u00e8ges sur le syst\u00e8me vuln\u00e9rable (CVE-2011-0227).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0227"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
},
{
"name": "CVE-2010-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3855"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4802 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4802"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4803 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4803"
}
],
"reference": "CERTA-2011-AVI-395",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans Apple iOS permettent \u00e0 une personne\ndistante malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire et d\u0027\u00e9lever ses\nprivil\u00e8ges sur le syst\u00e8me.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apple HT4802 et HT4803 du 15 juillet 2011",
"url": null
}
]
}
CERTA-2011-AVI-564
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités présentes dans Mac OS X ont été corrigées.
Description
De multiples vulnérabilités découvertes dans Mac OS X permettent à une personne malveillante d'exécuter du code arbitraire à distance avec potentiellement des privilèges élevés, de provoquer un déni de service, de contourner la politique de sécurité du système, de porter atteinte à la confidentialité et à l'intégrité des données ou encore de réaliser une injection de code indirecte.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Lion Server v10.7 et v10.7.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.7 et v10.7.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans Mac OS X permettent \u00e0 une\npersonne malveillante d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance avec\npotentiellement des privil\u00e8ges \u00e9lev\u00e9s, de provoquer un d\u00e9ni de service,\nde contourner la politique de s\u00e9curit\u00e9 du syst\u00e8me, de porter atteinte \u00e0\nla confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es ou encore de r\u00e9aliser\nune injection de code indirecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3216"
},
{
"name": "CVE-2011-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3436"
},
{
"name": "CVE-2010-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1634"
},
{
"name": "CVE-2011-3214",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3214"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2011-3228",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3228"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2011-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0259"
},
{
"name": "CVE-2011-3221",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3221"
},
{
"name": "CVE-2010-4172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
},
{
"name": "CVE-2011-3217",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3217"
},
{
"name": "CVE-2011-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3219"
},
{
"name": "CVE-2011-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0534"
},
{
"name": "CVE-2011-0230",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0230"
},
{
"name": "CVE-2011-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0229"
},
{
"name": "CVE-2011-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1471"
},
{
"name": "CVE-2011-3222",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3222"
},
{
"name": "CVE-2011-1466",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1466"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
},
{
"name": "CVE-2011-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
},
{
"name": "CVE-2011-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0231"
},
{
"name": "CVE-2011-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3213"
},
{
"name": "CVE-2009-4022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4022"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2011-3218",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3218"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2011-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0249"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-0250",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0250"
},
{
"name": "CVE-2011-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
},
{
"name": "CVE-2011-3227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3227"
},
{
"name": "CVE-2011-1469",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1469"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2011-1910",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1910"
},
{
"name": "CVE-2011-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3220"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2010-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3614"
},
{
"name": "CVE-2011-3224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3224"
},
{
"name": "CVE-2011-3226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3226"
},
{
"name": "CVE-2011-0260",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0260"
},
{
"name": "CVE-2011-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2690"
},
{
"name": "CVE-2011-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3215"
},
{
"name": "CVE-2010-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3613"
},
{
"name": "CVE-2011-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1521"
},
{
"name": "CVE-2011-1467",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1467"
},
{
"name": "CVE-2011-1755",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1755"
},
{
"name": "CVE-2011-3246",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3246"
},
{
"name": "CVE-2011-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3435"
},
{
"name": "CVE-2011-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2691"
},
{
"name": "CVE-2011-3437",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3437"
},
{
"name": "CVE-2011-0251",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0251"
},
{
"name": "CVE-2011-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1470"
},
{
"name": "CVE-2011-3225",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3225"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2010-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
},
{
"name": "CVE-2011-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2464"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2010-0097",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0097"
},
{
"name": "CVE-2011-0707",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0707"
},
{
"name": "CVE-2011-0252",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0252"
},
{
"name": "CVE-2011-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0224"
},
{
"name": "CVE-2010-2089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2089"
},
{
"name": "CVE-2011-0420",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0420"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2011-1468",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1468"
},
{
"name": "CVE-2011-3223",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3223"
},
{
"name": "CVE-2011-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0185"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0708 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0708"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1467 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1467"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1910 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1910"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3217 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3217"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1153 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1153"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3220 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3220"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3614 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3614"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0420 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0420"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0411 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0411"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3613 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3613"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3225 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3225"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0249 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0249"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1521 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1521"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0185 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0185"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0252 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0252"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4645 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4645"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3213 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3213"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3221 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3221"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1471 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1471"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3435 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3435"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3218 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3218"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0013 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0013"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1634 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1634"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0250 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0250"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0259 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0259"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2690 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2690"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3216 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3216"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3212 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3212"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2089 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2089"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3718 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3718"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0260 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0260"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3214 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3214"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1157 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1157"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0707 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0707"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3223 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3223"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3246 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3246"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4172 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4172"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2691 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2691"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3437 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3437"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2009-4022 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2009-4022"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0187 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0187"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3192 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3192"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1755 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1755"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-0097 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-0097"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0419 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0419"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1466 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1466"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0421 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0421"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0251 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0251"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3219 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3219"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0229 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0229"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3222 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3222"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0534 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0534"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3228 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3228"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3215 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3215"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1092 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1092"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0230 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0230"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1470 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1470"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0231 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0231"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2692 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2692"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1468 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1468"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2464 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2464"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1469 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1469"
}
],
"reference": "CERTA-2011-AVI-564",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Mac OS X ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5002 du 12 octobre 2011",
"url": "http://docs.info.apple.com/article.html?artnum=HT5002"
}
]
}
CERTA-2011-AVI-395
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans Apple iOS permettent à une personne distante malintentionnée d'exécuter du code arbitraire et d'élever ses privilèges sur le système.
Description
Plusieurs vulnérabilités ont été découvertes dans Apple iOS :
- deux vulnérabilités dans la gestion de certaines polices de caractères FreeType permettent à une personne distante malintentionnée d'exécuter du code arbitraire via un fichier PDF spécialement conçu (CVE-2010-3855 et CVE-2011-0226) ;
- une erreur de conversion dans l'utilisation de primitives de gestion de queue d'IOMobileFrameBuffer permet à une personne malintentionnée d'élever ses privilèges sur le système vulnérable (CVE-2011-0227).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | Apple iOS versions 3.1 à 4.3.3 pour iPod touch de 3ème génération et postérieures ; | ||
| Apple | N/A | Apple iOS versions 3.0 à 4.3.3 pour iPhone 3GS et iPhone 4 modèle GSM ; | ||
| Apple | N/A | Apple iOS versions 3.2 à 4.3.3 pour iPad. | ||
| Apple | N/A | Apple iOS versions 4.2.5 à 4.2.8 pour iPhone 4 modèle CDMA ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple iOS versions 3.1 \u00e0 4.3.3 pour iPod touch de 3\u00e8me g\u00e9n\u00e9ration et post\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions 3.0 \u00e0 4.3.3 pour iPhone 3GS et iPhone 4 mod\u00e8le GSM ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions 3.2 \u00e0 4.3.3 pour iPad.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions 4.2.5 \u00e0 4.2.8 pour iPhone 4 mod\u00e8le CDMA ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apple iOS :\n\n- deux vuln\u00e9rabilit\u00e9s dans la gestion de certaines polices de\n caract\u00e8res FreeType permettent \u00e0 une personne distante\n malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire via un fichier PDF\n sp\u00e9cialement con\u00e7u (CVE-2010-3855 et CVE-2011-0226) ;\n- une erreur de conversion dans l\u0027utilisation de primitives de gestion\n de queue d\u0027IOMobileFrameBuffer permet \u00e0 une personne malintentionn\u00e9e\n d\u0027\u00e9lever ses privil\u00e8ges sur le syst\u00e8me vuln\u00e9rable (CVE-2011-0227).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0227"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
},
{
"name": "CVE-2010-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3855"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4802 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4802"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4803 du 15 juillet 2011 :",
"url": "http://support.apple.com/kb/HT4803"
}
],
"reference": "CERTA-2011-AVI-395",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans Apple iOS permettent \u00e0 une personne\ndistante malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire et d\u0027\u00e9lever ses\nprivil\u00e8ges sur le syst\u00e8me.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apple HT4802 et HT4803 du 15 juillet 2011",
"url": null
}
]
}
CERTA-2011-AVI-564
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités présentes dans Mac OS X ont été corrigées.
Description
De multiples vulnérabilités découvertes dans Mac OS X permettent à une personne malveillante d'exécuter du code arbitraire à distance avec potentiellement des privilèges élevés, de provoquer un déni de service, de contourner la politique de sécurité du système, de porter atteinte à la confidentialité et à l'intégrité des données ou encore de réaliser une injection de code indirecte.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Lion Server v10.7 et v10.7.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.7 et v10.7.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server v10.6.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans Mac OS X permettent \u00e0 une\npersonne malveillante d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance avec\npotentiellement des privil\u00e8ges \u00e9lev\u00e9s, de provoquer un d\u00e9ni de service,\nde contourner la politique de s\u00e9curit\u00e9 du syst\u00e8me, de porter atteinte \u00e0\nla confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es ou encore de r\u00e9aliser\nune injection de code indirecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3216"
},
{
"name": "CVE-2011-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3436"
},
{
"name": "CVE-2010-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1634"
},
{
"name": "CVE-2011-3214",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3214"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2011-3228",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3228"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2011-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0259"
},
{
"name": "CVE-2011-3221",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3221"
},
{
"name": "CVE-2010-4172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
},
{
"name": "CVE-2011-3217",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3217"
},
{
"name": "CVE-2011-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3219"
},
{
"name": "CVE-2011-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0534"
},
{
"name": "CVE-2011-0230",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0230"
},
{
"name": "CVE-2011-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0229"
},
{
"name": "CVE-2011-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1471"
},
{
"name": "CVE-2011-3222",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3222"
},
{
"name": "CVE-2011-1466",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1466"
},
{
"name": "CVE-2011-0226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0226"
},
{
"name": "CVE-2011-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
},
{
"name": "CVE-2011-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0231"
},
{
"name": "CVE-2011-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3213"
},
{
"name": "CVE-2009-4022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4022"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2011-3218",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3218"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2011-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0249"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-0250",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0250"
},
{
"name": "CVE-2011-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
},
{
"name": "CVE-2011-3227",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3227"
},
{
"name": "CVE-2011-1469",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1469"
},
{
"name": "CVE-2010-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
},
{
"name": "CVE-2011-1910",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1910"
},
{
"name": "CVE-2011-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3220"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2010-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3614"
},
{
"name": "CVE-2011-3224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3224"
},
{
"name": "CVE-2011-3226",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3226"
},
{
"name": "CVE-2011-0260",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0260"
},
{
"name": "CVE-2011-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2690"
},
{
"name": "CVE-2011-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3215"
},
{
"name": "CVE-2010-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3613"
},
{
"name": "CVE-2011-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1521"
},
{
"name": "CVE-2011-1467",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1467"
},
{
"name": "CVE-2011-1755",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1755"
},
{
"name": "CVE-2011-3246",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3246"
},
{
"name": "CVE-2011-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3435"
},
{
"name": "CVE-2011-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2691"
},
{
"name": "CVE-2011-3437",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3437"
},
{
"name": "CVE-2011-0251",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0251"
},
{
"name": "CVE-2011-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1470"
},
{
"name": "CVE-2011-3225",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3225"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2010-3718",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
},
{
"name": "CVE-2011-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2464"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2010-0097",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0097"
},
{
"name": "CVE-2011-0707",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0707"
},
{
"name": "CVE-2011-0252",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0252"
},
{
"name": "CVE-2011-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0224"
},
{
"name": "CVE-2010-2089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2089"
},
{
"name": "CVE-2011-0420",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0420"
},
{
"name": "CVE-2010-1157",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2011-1468",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1468"
},
{
"name": "CVE-2011-3223",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3223"
},
{
"name": "CVE-2011-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0185"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0708 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0708"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1467 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1467"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1910 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1910"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3217 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3217"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1153 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1153"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3220 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3220"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3614 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3614"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0420 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0420"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0411 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0411"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3613 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3613"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3225 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3225"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0249 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0249"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1521 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1521"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0185 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0185"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0252 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0252"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4645 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4645"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3213 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3213"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3221 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3221"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1471 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1471"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3435 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3435"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3218 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3218"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0013 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0013"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1634 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1634"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0250 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0250"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3224 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3224"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0259 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0259"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2690 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2690"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3226 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3226"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3216 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3216"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3212 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3212"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2089 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2089"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-3718 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-3718"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0260 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0260"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3214 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3214"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-1157 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-1157"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0707 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0707"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3223 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3223"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3246 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3246"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-2227 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-2227"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-4172 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-4172"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3436 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3436"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2691 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2691"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3437 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3437"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2009-4022 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2009-4022"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0187 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0187"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3192 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3192"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1755 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1755"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2010-0097 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2010-0097"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0419 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0419"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1466 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1466"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0421 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0421"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0251 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0251"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3219 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3219"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0229 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0229"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3222 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3222"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0534 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0534"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3228 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3228"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-3215 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-3215"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1092 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1092"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0230 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0230"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1470 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1470"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-0231 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-0231"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2692 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2692"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1468 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1468"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-2464 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-2464"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2011-1469 :",
"url": "http://cve.mitre.org/cgi-bin/cvename-cgi?name=CVE-2011-1469"
}
],
"reference": "CERTA-2011-AVI-564",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Mac OS X ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5002 du 12 octobre 2011",
"url": "http://docs.info.apple.com/article.html?artnum=HT5002"
}
]
}
FKIE_CVE-2011-0226
Vulnerability from fkie_nvd - Published: 2011-07-19 22:55 - Updated: 2026-04-29 01:13| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | ||
| product-security@apple.com | http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html | Vendor Advisory | |
| product-security@apple.com | http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html | Vendor Advisory | |
| product-security@apple.com | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html | ||
| product-security@apple.com | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html | ||
| product-security@apple.com | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html | ||
| product-security@apple.com | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html | ||
| product-security@apple.com | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html | ||
| product-security@apple.com | http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html | ||
| product-security@apple.com | http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html | ||
| product-security@apple.com | http://secunia.com/advisories/45167 | Vendor Advisory | |
| product-security@apple.com | http://secunia.com/advisories/45224 | Vendor Advisory | |
| product-security@apple.com | http://support.apple.com/kb/HT4802 | Vendor Advisory | |
| product-security@apple.com | http://support.apple.com/kb/HT4803 | Vendor Advisory | |
| product-security@apple.com | http://support.apple.com/kb/HT5002 | ||
| product-security@apple.com | http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html | ||
| product-security@apple.com | http://www.debian.org/security/2011/dsa-2294 | ||
| product-security@apple.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:120 | ||
| product-security@apple.com | http://www.redhat.com/support/errata/RHSA-2011-1085.html | ||
| product-security@apple.com | http://www.securityfocus.com/bid/48619 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45167 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45224 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4802 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4803 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5002 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2294 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:120 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-1085.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48619 |
| Vendor | Product | Version | |
|---|---|---|---|
| freetype | freetype | * | |
| freetype | freetype | 2.2.1 | |
| freetype | freetype | 2.2.10 | |
| freetype | freetype | 2.3.0 | |
| freetype | freetype | 2.3.1 | |
| freetype | freetype | 2.3.2 | |
| freetype | freetype | 2.3.3 | |
| freetype | freetype | 2.3.4 | |
| freetype | freetype | 2.3.5 | |
| freetype | freetype | 2.3.6 | |
| freetype | freetype | 2.3.7 | |
| freetype | freetype | 2.3.8 | |
| freetype | freetype | 2.3.9 | |
| freetype | freetype | 2.3.10 | |
| freetype | freetype | 2.3.11 | |
| freetype | freetype | 2.3.12 | |
| freetype | freetype | 2.4.0 | |
| freetype | freetype | 2.4.1 | |
| freetype | freetype | 2.4.2 | |
| freetype | freetype | 2.4.3 | |
| freetype | freetype | 2.4.4 | |
| apple | iphone_os | * | |
| apple | iphone_os | 1.0.0 | |
| apple | iphone_os | 1.0.1 | |
| apple | iphone_os | 1.0.2 | |
| apple | iphone_os | 1.1.0 | |
| apple | iphone_os | 1.1.1 | |
| apple | iphone_os | 1.1.2 | |
| apple | iphone_os | 1.1.3 | |
| apple | iphone_os | 1.1.4 | |
| apple | iphone_os | 1.1.5 | |
| apple | iphone_os | 2.0 | |
| apple | iphone_os | 2.0.0 | |
| apple | iphone_os | 2.0.1 | |
| apple | iphone_os | 2.0.2 | |
| apple | iphone_os | 2.1 | |
| apple | iphone_os | 2.1.1 | |
| apple | iphone_os | 2.2 | |
| apple | iphone_os | 2.2.1 | |
| apple | iphone_os | 3.0 | |
| apple | iphone_os | 3.0.1 | |
| apple | iphone_os | 3.1 | |
| apple | iphone_os | 3.1.2 | |
| apple | iphone_os | 3.1.3 | |
| apple | iphone_os | 3.2 | |
| apple | iphone_os | 3.2.1 | |
| apple | iphone_os | 3.2.2 | |
| apple | iphone_os | 4.0 | |
| apple | iphone_os | 4.0.1 | |
| apple | iphone_os | 4.0.2 | |
| apple | iphone_os | 4.1 | |
| apple | iphone_os | 4.2 | |
| apple | iphone_os | 4.2.1 | |
| apple | iphone_os | 4.2.5 | |
| apple | iphone_os | 4.3.0 | |
| apple | iphone_os | 4.3.1 | |
| apple | iphone_os | 4.3.2 | |
| apple | iphone_os | 4.3.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22668317-72EF-41B9-9379-1AEC251C5F49",
"versionEndIncluding": "2.4.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F7252819-BA8A-4BD1-BAAA-179A8777C994",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7B4450B4-B21F-4153-B9DD-C36A2381F00D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "11575E3C-2BEA-4264-AE41-4A962BD17035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D333A965-EAD2-40DB-8FBE-C4C7DF44C35C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA37666-D2E6-47EF-BFFE-A9449D6A72CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F2B49505-C973-4673-A9BC-34ACA25059D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E8ECCA-58F2-4A05-8DF2-79C09A5FB275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8697D11D-BBDF-4722-85F7-5144A5D26E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "50E3EDA8-04D1-4DF1-80BB-72C6003E8F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AB06CA25-BB25-43B8-9FC2-62C399CC52EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6AF7414E-33A7-40E2-AEF0-1AE9D7D1B077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC0BD12-E065-4CC9-8AEE-E4C34A58EC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "214DC64B-BA35-486B-AE30-F2D9381E4D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B7CDE19A-473A-4BC5-AA7B-3D08FEEEE82C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "DD8401A8-A328-49F6-BAE8-337F5F36C906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3FBF5BAA-8027-478F-BE06-3D3F4F823C7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31358B5D-4087-4207-9730-297BA47DAA83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3A73E016-A4B0-416D-B9B6-786A787DAD3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0588BCE1-059B-4602-B274-E9D268720B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D19BE9CC-6B1C-4AC8-9740-2ABDF40C4FEC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20E87ED9-A08D-48B2-83A8-AD2C0F6A22A9",
"versionEndIncluding": "4.2.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC16D1C-065A-4D1A-BA6E-528A71DF65CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1641DDFA-3BF1-467F-8EC3-98114FF9F07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF40CDA4-4716-4815-9ED0-093FE266734C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25A5D868-0016-44AB-80E6-E5DF91F15455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "863383DA-0BC6-4A96-835A-A96128EC0202",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "51D3BE2B-5A01-4AD4-A436-0056B50A535D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A20F171-79FE-43B9-8309-B18341639FA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "126EF22D-29BC-4366-97BC-B261311E6251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3A939B80-0AD0-48AF-81A7-370716F56639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D28528CE-4943-4F82-80C0-A629DA3E6702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12E22AF0-2B66-425A-A1EE-4F0E3B0433E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB34ECBE-33E8-40E1-936B-7800D2525AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "107C59BE-D8CF-4A17-8DFB-BED2AB12388D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "36C86BB9-0328-4E34-BC2B-47B3471EC262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1878949F-8E15-4751-8D8A-BFB2B9B9254A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A54A8681-2D8A-4B0B-A947-82F3CE1FB03C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0070D83-2E27-4DA8-8D10-A6A697216F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7252935C-E421-4339-B61F-0299E28888DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD342BF-096A-4082-B700-19629F2BDE87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "93141AB6-26F2-4C6D-95B3-D383EABB4034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5C61FF-7CD3-410A-94F2-5DE701466B1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011."
},
{
"lang": "es",
"value": "Error de entero sin signo en psaux/t1decode.c en FreeType anterior a v2.4.6, es usado enCoreGraphics en Apple iOS anterior a v4.2.9 y v4.3.x anterior a v4.3.4 y otros productos, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria o ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una fuente manipulada Type 1 en un documento PDF, como se explot\u00f3 en Julio 2011."
}
],
"id": "CVE-2011-0226",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-07-19T22:55:00.820",
"references": [
{
"source": "product-security@apple.com",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45167"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45224"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4802"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4803"
},
{
"source": "product-security@apple.com",
"url": "http://support.apple.com/kb/HT5002"
},
{
"source": "product-security@apple.com",
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"source": "product-security@apple.com",
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"source": "product-security@apple.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
},
{
"source": "product-security@apple.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"source": "product-security@apple.com",
"url": "http://www.securityfocus.com/bid/48619"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4803"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48619"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-85GM-R6VH-GFC5
Vulnerability from github – Published: 2022-05-17 05:37 – Updated: 2022-05-17 05:37Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
{
"affected": [],
"aliases": [
"CVE-2011-0226"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-07-19T22:55:00Z",
"severity": "HIGH"
},
"details": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.",
"id": "GHSA-85gm-r6vh-gfc5",
"modified": "2022-05-17T05:37:19Z",
"published": "2022-05-17T05:37:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0226"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"type": "WEB",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"type": "WEB",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"type": "WEB",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
},
{
"type": "WEB",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/45167"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/45224"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4802"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4803"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5002"
},
{
"type": "WEB",
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/48619"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-0226
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-0226",
"description": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.",
"id": "GSD-2011-0226",
"references": [
"https://www.suse.com/security/cve/CVE-2011-0226.html",
"https://www.debian.org/security/2011/dsa-2294",
"https://access.redhat.com/errata/RHSA-2011:1085",
"https://linux.oracle.com/cve/CVE-2011-0226.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-0226"
],
"details": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.",
"id": "GSD-2011-0226",
"modified": "2023-12-13T01:19:04.076965Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0226",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "45224",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45224"
},
{
"name": "http://support.apple.com/kb/HT4803",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4803"
},
{
"name": "APPLE-SA-2011-07-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"name": "openSUSE-SU-2011:0852",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"name": "48619",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48619"
},
{
"name": "[freetype-devel] 20110709 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"name": "APPLE-SA-2011-07-15-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"name": "45167",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45167"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "RHSA-2011:1085",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"name": "http://support.apple.com/kb/HT4802",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4802"
},
{
"name": "[freetype-devel] 20110708 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"name": "SUSE-SU-2011:0853",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"name": "DSA-2294",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "MDVSA-2011:120",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
},
{
"name": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html",
"refsource": "MISC",
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"name": "[freetype-devel] 20110708 details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.4.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.2.8",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0226"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT4802",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4802"
},
{
"name": "http://support.apple.com/kb/HT4803",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4803"
},
{
"name": "APPLE-SA-2011-07-15-2",
"refsource": "APPLE",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
},
{
"name": "48619",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/48619"
},
{
"name": "[freetype-devel] 20110709 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html"
},
{
"name": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html",
"refsource": "MISC",
"tags": [],
"url": "http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html"
},
{
"name": "45167",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45167"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html"
},
{
"name": "45224",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45224"
},
{
"name": "APPLE-SA-2011-07-15-1",
"refsource": "APPLE",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
},
{
"name": "[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html"
},
{
"name": "[freetype-devel] 20110708 Re: details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html"
},
{
"name": "[freetype-devel] 20110708 details on iPhone exploit caused by FreeType?",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html"
},
{
"name": "RHSA-2011:1085",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1085.html"
},
{
"name": "DSA-2294",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2294"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "SUSE-SU-2011:0853",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html"
},
{
"name": "openSUSE-SU-2011:0852",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html"
},
{
"name": "MDVSA-2011:120",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:120"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2011-10-26T02:56Z",
"publishedDate": "2011-07-19T22:55Z"
}
}
}
OPENSUSE-SU-2024:10172-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2009-0946/ | self |
| https://www.suse.com/security/cve/CVE-2010-2497/ | self |
| https://www.suse.com/security/cve/CVE-2010-2805/ | self |
| https://www.suse.com/security/cve/CVE-2010-3053/ | self |
| https://www.suse.com/security/cve/CVE-2010-3054/ | self |
| https://www.suse.com/security/cve/CVE-2010-3311/ | self |
| https://www.suse.com/security/cve/CVE-2010-3814/ | self |
| https://www.suse.com/security/cve/CVE-2011-0226/ | self |
| https://www.suse.com/security/cve/CVE-2012-5668/ | self |
| https://www.suse.com/security/cve/CVE-2012-5669/ | self |
| https://www.suse.com/security/cve/CVE-2012-5670/ | self |
| https://www.suse.com/security/cve/CVE-2014-2240/ | self |
| https://www.suse.com/security/cve/CVE-2014-9656/ | self |
| https://www.suse.com/security/cve/CVE-2014-9657/ | self |
| https://www.suse.com/security/cve/CVE-2014-9658/ | self |
| https://www.suse.com/security/cve/CVE-2014-9659/ | self |
| https://www.suse.com/security/cve/CVE-2014-9660/ | self |
| https://www.suse.com/security/cve/CVE-2014-9661/ | self |
| https://www.suse.com/security/cve/CVE-2014-9662/ | self |
| https://www.suse.com/security/cve/CVE-2014-9663/ | self |
| https://www.suse.com/security/cve/CVE-2014-9664/ | self |
| https://www.suse.com/security/cve/CVE-2014-9665/ | self |
| https://www.suse.com/security/cve/CVE-2014-9666/ | self |
| https://www.suse.com/security/cve/CVE-2014-9667/ | self |
| https://www.suse.com/security/cve/CVE-2014-9668/ | self |
| https://www.suse.com/security/cve/CVE-2014-9669/ | self |
| https://www.suse.com/security/cve/CVE-2014-9670/ | self |
| https://www.suse.com/security/cve/CVE-2014-9671/ | self |
| https://www.suse.com/security/cve/CVE-2014-9672/ | self |
| https://www.suse.com/security/cve/CVE-2014-9673/ | self |
| https://www.suse.com/security/cve/CVE-2014-9674/ | self |
| https://www.suse.com/security/cve/CVE-2014-9675/ | self |
| https://www.suse.com/security/cve/CVE-2009-0946 | external |
| https://bugzilla.suse.com/485889 | external |
| https://bugzilla.suse.com/496289 | external |
| https://bugzilla.suse.com/541626 | external |
| https://www.suse.com/security/cve/CVE-2010-2497 | external |
| https://bugzilla.suse.com/619562 | external |
| https://bugzilla.suse.com/635692 | external |
| https://www.suse.com/security/cve/CVE-2010-2805 | external |
| https://bugzilla.suse.com/629447 | external |
| https://bugzilla.suse.com/635692 | external |
| https://www.suse.com/security/cve/CVE-2010-3053 | external |
| https://bugzilla.suse.com/633938 | external |
| https://bugzilla.suse.com/635692 | external |
| https://bugzilla.suse.com/645982 | external |
| https://www.suse.com/security/cve/CVE-2010-3054 | external |
| https://bugzilla.suse.com/633943 | external |
| https://bugzilla.suse.com/635692 | external |
| https://bugzilla.suse.com/645982 | external |
| https://www.suse.com/security/cve/CVE-2010-3311 | external |
| https://bugzilla.suse.com/635692 | external |
| https://bugzilla.suse.com/641580 | external |
| https://bugzilla.suse.com/645982 | external |
| https://www.suse.com/security/cve/CVE-2010-3814 | external |
| https://bugzilla.suse.com/647375 | external |
| https://bugzilla.suse.com/689174 | external |
| https://www.suse.com/security/cve/CVE-2011-0226 | external |
| https://bugzilla.suse.com/704612 | external |
| https://bugzilla.suse.com/728044 | external |
| https://www.suse.com/security/cve/CVE-2012-5668 | external |
| https://bugzilla.suse.com/795826 | external |
| https://www.suse.com/security/cve/CVE-2012-5669 | external |
| https://bugzilla.suse.com/795826 | external |
| https://www.suse.com/security/cve/CVE-2012-5670 | external |
| https://bugzilla.suse.com/795826 | external |
| https://www.suse.com/security/cve/CVE-2014-2240 | external |
| https://bugzilla.suse.com/867620 | external |
| https://bugzilla.suse.com/916867 | external |
| https://www.suse.com/security/cve/CVE-2014-9656 | external |
| https://bugzilla.suse.com/916847 | external |
| https://www.suse.com/security/cve/CVE-2014-9657 | external |
| https://bugzilla.suse.com/916856 | external |
| https://www.suse.com/security/cve/CVE-2014-9658 | external |
| https://bugzilla.suse.com/916857 | external |
| https://www.suse.com/security/cve/CVE-2014-9659 | external |
| https://bugzilla.suse.com/916867 | external |
| https://www.suse.com/security/cve/CVE-2014-9660 | external |
| https://bugzilla.suse.com/916858 | external |
| https://www.suse.com/security/cve/CVE-2014-9661 | external |
| https://bugzilla.suse.com/916859 | external |
| https://www.suse.com/security/cve/CVE-2014-9662 | external |
| https://bugzilla.suse.com/916860 | external |
| https://www.suse.com/security/cve/CVE-2014-9663 | external |
| https://bugzilla.suse.com/916865 | external |
| https://www.suse.com/security/cve/CVE-2014-9664 | external |
| https://bugzilla.suse.com/916864 | external |
| https://www.suse.com/security/cve/CVE-2014-9665 | external |
| https://bugzilla.suse.com/916863 | external |
| https://www.suse.com/security/cve/CVE-2014-9666 | external |
| https://bugzilla.suse.com/916862 | external |
| https://www.suse.com/security/cve/CVE-2014-9667 | external |
| https://bugzilla.suse.com/916861 | external |
| https://www.suse.com/security/cve/CVE-2014-9668 | external |
| https://bugzilla.suse.com/916868 | external |
| https://www.suse.com/security/cve/CVE-2014-9669 | external |
| https://bugzilla.suse.com/916870 | external |
| https://www.suse.com/security/cve/CVE-2014-9670 | external |
| https://bugzilla.suse.com/916871 | external |
| https://bugzilla.suse.com/933247 | external |
| https://www.suse.com/security/cve/CVE-2014-9671 | external |
| https://bugzilla.suse.com/916872 | external |
| https://bugzilla.suse.com/933247 | external |
| https://www.suse.com/security/cve/CVE-2014-9672 | external |
| https://bugzilla.suse.com/916873 | external |
| https://www.suse.com/security/cve/CVE-2014-9673 | external |
| https://bugzilla.suse.com/916874 | external |
| https://www.suse.com/security/cve/CVE-2014-9674 | external |
| https://bugzilla.suse.com/916879 | external |
| https://www.suse.com/security/cve/CVE-2014-9675 | external |
| https://bugzilla.suse.com/916881 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ft2demos-2.7-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ft2demos-2.7-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10172",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10172-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0946 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2497 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2497/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2805 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3053 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3054 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3311 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3814 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0226 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-5668 page",
"url": "https://www.suse.com/security/cve/CVE-2012-5668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-5669 page",
"url": "https://www.suse.com/security/cve/CVE-2012-5669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-5670 page",
"url": "https://www.suse.com/security/cve/CVE-2012-5670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2240 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2240/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9656 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9657 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9657/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9658 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9658/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9659 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9660 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9661 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9662 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9662/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9663 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9664 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9665 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9665/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9666 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9668 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9669 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9670 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9671 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9672 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9673 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9674 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9675 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9675/"
}
],
"title": "ft2demos-2.7-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10172-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ft2demos-2.7-1.1.aarch64",
"product": {
"name": "ft2demos-2.7-1.1.aarch64",
"product_id": "ft2demos-2.7-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ft2demos-2.7-1.1.ppc64le",
"product": {
"name": "ft2demos-2.7-1.1.ppc64le",
"product_id": "ft2demos-2.7-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ft2demos-2.7-1.1.s390x",
"product": {
"name": "ft2demos-2.7-1.1.s390x",
"product_id": "ft2demos-2.7-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ft2demos-2.7-1.1.x86_64",
"product": {
"name": "ft2demos-2.7-1.1.x86_64",
"product_id": "ft2demos-2.7-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ft2demos-2.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64"
},
"product_reference": "ft2demos-2.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ft2demos-2.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le"
},
"product_reference": "ft2demos-2.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ft2demos-2.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x"
},
"product_reference": "ft2demos-2.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ft2demos-2.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
},
"product_reference": "ft2demos-2.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-0946"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-0946",
"url": "https://www.suse.com/security/cve/CVE-2009-0946"
},
{
"category": "external",
"summary": "SUSE Bug 485889 for CVE-2009-0946",
"url": "https://bugzilla.suse.com/485889"
},
{
"category": "external",
"summary": "SUSE Bug 496289 for CVE-2009-0946",
"url": "https://bugzilla.suse.com/496289"
},
{
"category": "external",
"summary": "SUSE Bug 541626 for CVE-2009-0946",
"url": "https://bugzilla.suse.com/541626"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-0946"
},
{
"cve": "CVE-2010-2497",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2497"
}
],
"notes": [
{
"category": "general",
"text": "Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2497",
"url": "https://www.suse.com/security/cve/CVE-2010-2497"
},
{
"category": "external",
"summary": "SUSE Bug 619562 for CVE-2010-2497",
"url": "https://bugzilla.suse.com/619562"
},
{
"category": "external",
"summary": "SUSE Bug 635692 for CVE-2010-2497",
"url": "https://bugzilla.suse.com/635692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2497"
},
{
"cve": "CVE-2010-2805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2805"
}
],
"notes": [
{
"category": "general",
"text": "The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2805",
"url": "https://www.suse.com/security/cve/CVE-2010-2805"
},
{
"category": "external",
"summary": "SUSE Bug 629447 for CVE-2010-2805",
"url": "https://bugzilla.suse.com/629447"
},
{
"category": "external",
"summary": "SUSE Bug 635692 for CVE-2010-2805",
"url": "https://bugzilla.suse.com/635692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2805"
},
{
"cve": "CVE-2010-3053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3053"
}
],
"notes": [
{
"category": "general",
"text": "bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3053",
"url": "https://www.suse.com/security/cve/CVE-2010-3053"
},
{
"category": "external",
"summary": "SUSE Bug 633938 for CVE-2010-3053",
"url": "https://bugzilla.suse.com/633938"
},
{
"category": "external",
"summary": "SUSE Bug 635692 for CVE-2010-3053",
"url": "https://bugzilla.suse.com/635692"
},
{
"category": "external",
"summary": "SUSE Bug 645982 for CVE-2010-3053",
"url": "https://bugzilla.suse.com/645982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3053"
},
{
"cve": "CVE-2010-3054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3054"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3054",
"url": "https://www.suse.com/security/cve/CVE-2010-3054"
},
{
"category": "external",
"summary": "SUSE Bug 633943 for CVE-2010-3054",
"url": "https://bugzilla.suse.com/633943"
},
{
"category": "external",
"summary": "SUSE Bug 635692 for CVE-2010-3054",
"url": "https://bugzilla.suse.com/635692"
},
{
"category": "external",
"summary": "SUSE Bug 645982 for CVE-2010-3054",
"url": "https://bugzilla.suse.com/645982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3054"
},
{
"cve": "CVE-2010-3311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3311"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an \"input stream position error\" issue, a different vulnerability than CVE-2010-1797.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3311",
"url": "https://www.suse.com/security/cve/CVE-2010-3311"
},
{
"category": "external",
"summary": "SUSE Bug 635692 for CVE-2010-3311",
"url": "https://bugzilla.suse.com/635692"
},
{
"category": "external",
"summary": "SUSE Bug 641580 for CVE-2010-3311",
"url": "https://bugzilla.suse.com/641580"
},
{
"category": "external",
"summary": "SUSE Bug 645982 for CVE-2010-3311",
"url": "https://bugzilla.suse.com/645982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2010-3311"
},
{
"cve": "CVE-2010-3814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3814"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3814",
"url": "https://www.suse.com/security/cve/CVE-2010-3814"
},
{
"category": "external",
"summary": "SUSE Bug 647375 for CVE-2010-3814",
"url": "https://bugzilla.suse.com/647375"
},
{
"category": "external",
"summary": "SUSE Bug 689174 for CVE-2010-3814",
"url": "https://bugzilla.suse.com/689174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3814"
},
{
"cve": "CVE-2011-0226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0226"
}
],
"notes": [
{
"category": "general",
"text": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0226",
"url": "https://www.suse.com/security/cve/CVE-2011-0226"
},
{
"category": "external",
"summary": "SUSE Bug 704612 for CVE-2011-0226",
"url": "https://bugzilla.suse.com/704612"
},
{
"category": "external",
"summary": "SUSE Bug 728044 for CVE-2011-0226",
"url": "https://bugzilla.suse.com/728044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2011-0226"
},
{
"cve": "CVE-2012-5668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-5668"
}
],
"notes": [
{
"category": "general",
"text": "FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an \"allocation error\" in the bdf_free_font function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-5668",
"url": "https://www.suse.com/security/cve/CVE-2012-5668"
},
{
"category": "external",
"summary": "SUSE Bug 795826 for CVE-2012-5668",
"url": "https://bugzilla.suse.com/795826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-5668"
},
{
"cve": "CVE-2012-5669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-5669"
}
],
"notes": [
{
"category": "general",
"text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-5669",
"url": "https://www.suse.com/security/cve/CVE-2012-5669"
},
{
"category": "external",
"summary": "SUSE Bug 795826 for CVE-2012-5669",
"url": "https://bugzilla.suse.com/795826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-5669"
},
{
"cve": "CVE-2012-5670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-5670"
}
],
"notes": [
{
"category": "general",
"text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-5670",
"url": "https://www.suse.com/security/cve/CVE-2012-5670"
},
{
"category": "external",
"summary": "SUSE Bug 795826 for CVE-2012-5670",
"url": "https://bugzilla.suse.com/795826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-5670"
},
{
"cve": "CVE-2014-2240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2240"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2240",
"url": "https://www.suse.com/security/cve/CVE-2014-2240"
},
{
"category": "external",
"summary": "SUSE Bug 867620 for CVE-2014-2240",
"url": "https://bugzilla.suse.com/867620"
},
{
"category": "external",
"summary": "SUSE Bug 916867 for CVE-2014-2240",
"url": "https://bugzilla.suse.com/916867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-2240"
},
{
"cve": "CVE-2014-9656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9656"
}
],
"notes": [
{
"category": "general",
"text": "The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9656",
"url": "https://www.suse.com/security/cve/CVE-2014-9656"
},
{
"category": "external",
"summary": "SUSE Bug 916847 for CVE-2014-9656",
"url": "https://bugzilla.suse.com/916847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9656"
},
{
"cve": "CVE-2014-9657",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9657"
}
],
"notes": [
{
"category": "general",
"text": "The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9657",
"url": "https://www.suse.com/security/cve/CVE-2014-9657"
},
{
"category": "external",
"summary": "SUSE Bug 916856 for CVE-2014-9657",
"url": "https://bugzilla.suse.com/916856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9657"
},
{
"cve": "CVE-2014-9658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9658"
}
],
"notes": [
{
"category": "general",
"text": "The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9658",
"url": "https://www.suse.com/security/cve/CVE-2014-9658"
},
{
"category": "external",
"summary": "SUSE Bug 916857 for CVE-2014-9658",
"url": "https://bugzilla.suse.com/916857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9658"
},
{
"cve": "CVE-2014-9659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9659"
}
],
"notes": [
{
"category": "general",
"text": "cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9659",
"url": "https://www.suse.com/security/cve/CVE-2014-9659"
},
{
"category": "external",
"summary": "SUSE Bug 916867 for CVE-2014-9659",
"url": "https://bugzilla.suse.com/916867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9659"
},
{
"cve": "CVE-2014-9660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9660"
}
],
"notes": [
{
"category": "general",
"text": "The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9660",
"url": "https://www.suse.com/security/cve/CVE-2014-9660"
},
{
"category": "external",
"summary": "SUSE Bug 916858 for CVE-2014-9660",
"url": "https://bugzilla.suse.com/916858"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9660"
},
{
"cve": "CVE-2014-9661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9661"
}
],
"notes": [
{
"category": "general",
"text": "type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9661",
"url": "https://www.suse.com/security/cve/CVE-2014-9661"
},
{
"category": "external",
"summary": "SUSE Bug 916859 for CVE-2014-9661",
"url": "https://bugzilla.suse.com/916859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9661"
},
{
"cve": "CVE-2014-9662",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9662"
}
],
"notes": [
{
"category": "general",
"text": "cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9662",
"url": "https://www.suse.com/security/cve/CVE-2014-9662"
},
{
"category": "external",
"summary": "SUSE Bug 916860 for CVE-2014-9662",
"url": "https://bugzilla.suse.com/916860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9662"
},
{
"cve": "CVE-2014-9663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9663"
}
],
"notes": [
{
"category": "general",
"text": "The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field\u0027s value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9663",
"url": "https://www.suse.com/security/cve/CVE-2014-9663"
},
{
"category": "external",
"summary": "SUSE Bug 916865 for CVE-2014-9663",
"url": "https://bugzilla.suse.com/916865"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9663"
},
{
"cve": "CVE-2014-9664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9664"
}
],
"notes": [
{
"category": "general",
"text": "FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9664",
"url": "https://www.suse.com/security/cve/CVE-2014-9664"
},
{
"category": "external",
"summary": "SUSE Bug 916864 for CVE-2014-9664",
"url": "https://bugzilla.suse.com/916864"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9664"
},
{
"cve": "CVE-2014-9665",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9665"
}
],
"notes": [
{
"category": "general",
"text": "The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9665",
"url": "https://www.suse.com/security/cve/CVE-2014-9665"
},
{
"category": "external",
"summary": "SUSE Bug 916863 for CVE-2014-9665",
"url": "https://bugzilla.suse.com/916863"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9665"
},
{
"cve": "CVE-2014-9666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9666"
}
],
"notes": [
{
"category": "general",
"text": "The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9666",
"url": "https://www.suse.com/security/cve/CVE-2014-9666"
},
{
"category": "external",
"summary": "SUSE Bug 916862 for CVE-2014-9666",
"url": "https://bugzilla.suse.com/916862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9666"
},
{
"cve": "CVE-2014-9667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9667"
}
],
"notes": [
{
"category": "general",
"text": "sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9667",
"url": "https://www.suse.com/security/cve/CVE-2014-9667"
},
{
"category": "external",
"summary": "SUSE Bug 916861 for CVE-2014-9667",
"url": "https://bugzilla.suse.com/916861"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9667"
},
{
"cve": "CVE-2014-9668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9668"
}
],
"notes": [
{
"category": "general",
"text": "The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9668",
"url": "https://www.suse.com/security/cve/CVE-2014-9668"
},
{
"category": "external",
"summary": "SUSE Bug 916868 for CVE-2014-9668",
"url": "https://bugzilla.suse.com/916868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9668"
},
{
"cve": "CVE-2014-9669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9669"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9669",
"url": "https://www.suse.com/security/cve/CVE-2014-9669"
},
{
"category": "external",
"summary": "SUSE Bug 916870 for CVE-2014-9669",
"url": "https://bugzilla.suse.com/916870"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9669"
},
{
"cve": "CVE-2014-9670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9670"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9670",
"url": "https://www.suse.com/security/cve/CVE-2014-9670"
},
{
"category": "external",
"summary": "SUSE Bug 916871 for CVE-2014-9670",
"url": "https://bugzilla.suse.com/916871"
},
{
"category": "external",
"summary": "SUSE Bug 933247 for CVE-2014-9670",
"url": "https://bugzilla.suse.com/933247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9670"
},
{
"cve": "CVE-2014-9671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9671"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9671",
"url": "https://www.suse.com/security/cve/CVE-2014-9671"
},
{
"category": "external",
"summary": "SUSE Bug 916872 for CVE-2014-9671",
"url": "https://bugzilla.suse.com/916872"
},
{
"category": "external",
"summary": "SUSE Bug 933247 for CVE-2014-9671",
"url": "https://bugzilla.suse.com/933247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9671"
},
{
"cve": "CVE-2014-9672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9672"
}
],
"notes": [
{
"category": "general",
"text": "Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9672",
"url": "https://www.suse.com/security/cve/CVE-2014-9672"
},
{
"category": "external",
"summary": "SUSE Bug 916873 for CVE-2014-9672",
"url": "https://bugzilla.suse.com/916873"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9672"
},
{
"cve": "CVE-2014-9673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9673"
}
],
"notes": [
{
"category": "general",
"text": "Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9673",
"url": "https://www.suse.com/security/cve/CVE-2014-9673"
},
{
"category": "external",
"summary": "SUSE Bug 916874 for CVE-2014-9673",
"url": "https://bugzilla.suse.com/916874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9673"
},
{
"cve": "CVE-2014-9674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9674"
}
],
"notes": [
{
"category": "general",
"text": "The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9674",
"url": "https://www.suse.com/security/cve/CVE-2014-9674"
},
{
"category": "external",
"summary": "SUSE Bug 916879 for CVE-2014-9674",
"url": "https://bugzilla.suse.com/916879"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9674"
},
{
"cve": "CVE-2014-9675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9675"
}
],
"notes": [
{
"category": "general",
"text": "bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9675",
"url": "https://www.suse.com/security/cve/CVE-2014-9675"
},
{
"category": "external",
"summary": "SUSE Bug 916881 for CVE-2014-9675",
"url": "https://bugzilla.suse.com/916881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x",
"openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-9675"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.