Unrated severityNVD Advisory· Published Aug 16, 2010· Updated Apr 29, 2026
CVE-2010-1797
CVE-2010-1797
Description
Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
Affected products
65cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*+ 64 more
- cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
22- www.exploit-db.com/exploits/14538nvdExploit
- www.securityfocus.com/bid/42151nvdExploit
- lists.apple.com/archives/security-announce/2010//Aug/msg00001.htmlnvdVendor Advisory
- secunia.com/advisories/40807nvdVendor Advisory
- secunia.com/advisories/40816nvdVendor Advisory
- secunia.com/advisories/40982nvdVendor Advisory
- support.apple.com/kb/HT4291nvdVendor Advisory
- support.apple.com/kb/HT4292nvdVendor Advisory
- www.vupen.com/english/advisories/2010/2018nvdVendor Advisory
- www.vupen.com/english/advisories/2010/2106nvdVendor Advisory
- freetype.sourceforge.net/index2.htmlnvd
- git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/nvd
- git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/nvd
- lists.apple.com/archives/security-announce/2010//Aug/msg00000.htmlnvd
- osvdb.org/66828nvd
- secunia.com/advisories/48951nvd
- sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/viewnvd
- www.f-secure.com/weblog/archives/00002002.htmlnvd
- www.ubuntu.com/usn/USN-972-1nvd
- bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019nvd
- bugzilla.redhat.com/show_bug.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/60856nvd
News mentions
0No linked articles in our index yet.