CVE-2010-1797 (CNNVD-201008-143)

CRITICAL 有利用代码
中文标题:
Apple iOS FreeType栈缓冲区溢出漏洞
英文标题:
Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2...
CVSS分数: 9.3
发布时间: 2010-08-16 18:25:00
漏洞类型: 缓冲区错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v5
漏洞描述
中文描述:

FreeType是FreeType团队开发的一个基于C语言的、高质量的且可移植的开源字体引擎库,它可用来将字符栅格化并映射成位图以及提供其他字体相关业务的支持。 在iPhone和iPod touch上的Apple iOS 4.0.2之前版本以及iPad上的3.2.2之前版本中使用的FreeType 2.4.2之前版本中的cff/cffgload.c的CFF Type2 CharStrings解释器中的cff_decoder_parse_charstrings函数中存在多个基于栈的缓冲区溢出漏洞。远程攻击者可以借助PDF文件内嵌入式字体中的特制CFF操作码执行任意代码或者导致拒绝服务(内存破坏)。

英文描述:

Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.

CWE类型:
CWE-119
标签:
local ios jailbreakme OSVDB-67011 OSVDB-66828 OSVDB-66827 windows Jose Miguel Esparza
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apple iphone_os 1.0.0 - - cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
apple iphone_os 1.0.1 - - cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
apple iphone_os 1.0.2 - - cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
apple iphone_os 1.1.0 - - cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
apple iphone_os 1.1.1 - - cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
apple iphone_os 1.1.2 - - cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
apple iphone_os 1.1.3 - - cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
apple iphone_os 1.1.4 - - cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
apple iphone_os 1.1.5 - - cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
apple iphone_os 2.0 - - cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
apple iphone_os 2.0.0 - - cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
apple iphone_os 2.0.1 - - cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
apple iphone_os 2.0.2 - - cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
apple iphone_os 2.1 - - cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
apple iphone_os 2.1.1 - - cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
apple iphone_os 2.2 - - cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
apple iphone_os 2.2.1 - - cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
apple iphone_os 3.0 - - cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
apple iphone_os 3.0.1 - - cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
apple iphone_os 3.1 - - cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
apple iphone_os 3.1.2 - - cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
apple iphone_os 3.1.3 - - cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
apple iphone_os 3.2 - - cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
apple iphone_os 3.2.1 - - cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
apple iphone_os 4.0 - - cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
apple iphone_os 4.0.1 - - cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
14538 exploit
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
ADV-2010-2018 vdb-entry
cve.org
访问
66828 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
USN-972-1 vendor-advisory
cve.org
访问
APPLE-SA-2010-08-11-2 vendor-advisory
cve.org
访问
40816 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
42151 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
40982 third-party-advisory
cve.org
访问
ADV-2010-2106 vdb-entry
cve.org
访问
APPLE-SA-2010-08-11-1 vendor-advisory
cve.org
访问
48951 third-party-advisory
cve.org
访问
appleios-pdf-code-execution(60856) vdb-entry
cve.org
访问
40807 third-party-advisory
cve.org
访问
ExploitDB EDB-14538 EXPLOIT
exploitdb
访问
Download Exploit EDB-14538 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2010-2973 ADVISORY
cve.org
访问
CVE Reference: CVE-2010-2972 ADVISORY
cve.org
访问
CVE Reference: CVE-2010-1797 ADVISORY
cve.org
访问
ExploitDB EDB-14727 EXPLOIT
exploitdb
访问
Download Exploit EDB-14727 EXPLOIT
exploitdb
访问
CVSS评分详情
9.3
CRITICAL
CVSS向量: AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2010-08-16 18:25:00
修改时间:
2024-08-07 01:35:53
创建时间:
2025-11-11 15:33:08
更新时间:
2025-11-11 16:08:28
利用信息
此漏洞有可利用代码!
利用代码数量: 2
利用来源:
未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2010-1797 2025-11-11 15:18:16 2025-11-11 07:33:08
NVD nvd_CVE-2010-1797 2025-11-11 14:53:26 2025-11-11 07:41:56
CNNVD cnnvd_CNNVD-201008-143 2025-11-11 15:09:10 2025-11-11 07:49:45
EXPLOITDB exploitdb_EDB-14538 2025-11-11 15:05:23 2025-11-11 08:08:09
EXPLOITDB exploitdb_EDB-14727 2025-11-11 15:05:52 2025-11-11 08:08:28
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5 EXPLOITDB
2025-11-11 16:08:28
references_count: 27 → 29; tags_count: 6 → 8
查看详细变更
  • references_count: 27 -> 29
  • tags_count: 6 -> 8
v4 EXPLOITDB
2025-11-11 16:08:09
references_count: 22 → 27; tags_count: 0 → 6; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 22 -> 27
  • tags_count: 0 -> 6
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:45
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-201008-143; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 缓冲区错误
  • cnnvd_id: 未提取 -> CNNVD-201008-143
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:56
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 26; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 26
  • data_sources: ['cve'] -> ['cve', 'nvd']