Vulnerability Details : CVE-2011-0226
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-0226
Probability of exploitation activity in the next 30 days: 5.83%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-0226
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2011-0226
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0226
-
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html
[security-announce] SUSE-SU-2011:0853-1: important: Security update for
-
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html
[ft-devel] details on iPhone exploit caused by FreeType?
-
http://support.apple.com/kb/HT4802
About the security content of iOS 4.3.4 Software Update - Apple SupportVendor Advisory
-
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html
Re: [ft-devel] details on iPhone exploit caused by FreeType?
-
http://www.debian.org/security/2011/dsa-2294
Debian -- Security Information -- DSA-2294-1 freetype
-
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
Apple - Lists.apple.com
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:120
mandriva.com
-
http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
Apple - Lists.apple.comVendor Advisory
-
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html
Re: [ft-devel] details on iPhone exploit caused by FreeType?
-
http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html
Hackers release new browser-based iOS 'jailbreak' based on PDF exploit
-
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html
[security-announce] openSUSE-SU-2011:0852-1: important: freetype: Fixed
-
http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
Apple - Lists.apple.comVendor Advisory
-
http://support.apple.com/kb/HT4803
About the security content of iOS 4.2.9 Software Update for iPhone - Apple SupportVendor Advisory
-
http://www.securityfocus.com/bid/48619
FreeType 'src/psaux/t1decode.c' Memory Corruption Vulnerability
-
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html
Re: [ft-devel] details on iPhone exploit caused by FreeType?
-
http://www.redhat.com/support/errata/RHSA-2011-1085.html
Support
-
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html
Re: [ft-devel] details on iPhone exploit caused by FreeType?
-
http://support.apple.com/kb/HT5002
About the security content of OS X Lion v10.7.2 and Security Update 2011-006 - Apple Support
Products affected by CVE-2011-0226
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*