CVE-2009-0946

N/A Unknown
Published: April 17, 2009 Modified: April 23, 2026
View on NVD

Description

Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog
Source: cve@mitre.org
Release Notes Third Party Advisory
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://secunia.com/advisories/34723
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/34913
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/34967
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35065
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35074
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35198
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35200
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35204
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35210
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35379
Source: cve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200905-05.xml
Source: cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT3549
Source: cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT3613
Source: cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT3639
Source: cve@mitre.org
Third Party Advisory
http://support.apple.com/kb/HT4435
Source: cve@mitre.org
Broken Link
http://www.debian.org/security/2009/dsa-1784
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-0329.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1061.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1062.html
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/34550
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-767-1
Source: cve@mitre.org
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2009/1058
Source: cve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1297
Source: cve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1522
Source: cve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1621
Source: cve@mitre.org
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=491384
Source: cve@mitre.org
Issue Tracking Patch Third Party Advisory
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes Third Party Advisory
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/34723
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/34913
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/34967
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35065
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35074
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35198
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35200
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35204
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35210
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35379
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200905-05.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.apple.com/kb/HT3549
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT3613
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT3639
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT4435
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2009/dsa-1784
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:243
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-0329.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1061.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1062.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/34550
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-767-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2009/1058
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1297
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1522
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1621
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=491384
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

78 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
16.4%
95th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

suse opensuse canonical freetype debian apple