First published: Fri Mar 20 2009(Updated: )
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freetype | <0:2.0.3-17.el21 | 0:2.0.3-17.el21 |
redhat/freetype | <0:2.1.4-12.el3 | 0:2.1.4-12.el3 |
redhat/freetype | <0:2.1.9-10.el4.7 | 0:2.1.9-10.el4.7 |
redhat/freetype | <0:2.2.1-21.el5_3 | 0:2.2.1-21.el5_3 |
FreeType | <=2.3.9 | |
Debian Linux | =5.0 | |
Debian Linux | =4.0 | |
Debian Linux | =6.0 | |
Ubuntu | =9.04 | |
Ubuntu | =8.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
openSUSE | =11.1 | |
openSUSE | =11.0 | |
openSUSE | =10.3 | |
SUSE Linux Enterprise Server | =11 | |
SUSE Linux Enterprise Server | =10 | |
Apple iOS and macOS | =10.5.8 | |
Apple iOS and macOS | =10.4.11 | |
Apple iOS and macOS | =10.5.8 | |
Safari | =4.0 | |
Apple iOS and macOS | =10.4.11 | |
iPhone OS | >=1.0.0<=2.2.1 | |
Apple iOS and macOS | >=10.6.0<=10.6.4 | |
Apple iOS and macOS | >=10.6.0<=10.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2009-0946 is rated as critical due to its potential to allow remote code execution.
To fix CVE-2009-0946, upgrade FreeType to version 2.0.3-17.el21 or later.
FreeType versions up to and including 2.3.9 are affected by CVE-2009-0946.
Yes, CVE-2009-0946 can affect systems running FreeType on multiple platforms, including macOS and Windows.
CVE-2009-0946 can facilitate remote attackers executing arbitrary code through specific crafted input.