Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717", "name": "20080610 Multiple Vendor FreeType2 Multiple Heap Overflow Vulnerabilities", "tags": [], "refsource": "IDEFENSE"}, {"url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780", "name": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780", "tags": [], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/29637", "name": "29637", "tags": ["Patch"], "refsource": "BID"}, {"url": "http://www.securityfocus.com/bid/29639", "name": "29639", "tags": ["Patch"], "refsource": "BID"}, {"url": "http://securitytracker.com/id?1020240", "name": "1020240", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/30600", "name": "30600", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/31709", "name": "31709", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html", "name": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", "name": "SUSE-SR:2008:014", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/30821", "name": "30821", "tags": [], "refsource": "SECUNIA"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "name": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html", "name": "APPLE-SA-2008-09-09", "tags": [], "refsource": "APPLE"}, {"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1", "name": "239006", "tags": [], "refsource": "SUNALERT"}, {"url": "http://secunia.com/advisories/30721", "name": "30721", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/30740", "name": "30740", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/31712", "name": "31712", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html", "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "tags": [], "refsource": "FULLDISC"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html", "name": "RHSA-2008:0558", "tags": [], "refsource": "REDHAT"}, {"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html", "name": "FEDORA-2008-5430", "tags": [], "refsource": "FEDORA"}, {"url": "http://secunia.com/advisories/30766", "name": "30766", "tags": [], "refsource": "SECUNIA"}, {"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html", "name": "FEDORA-2008-5425", "tags": [], "refsource": "FEDORA"}, {"url": "http://secunia.com/advisories/31707", "name": "31707", "tags": [], "refsource": "SECUNIA"}, {"url": "http://security.gentoo.org/glsa/glsa-200806-10.xml", "name": "GLSA-200806-10", "tags": [], "refsource": "GENTOO"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html", "name": "RHSA-2008:0556", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121", "name": "MDVSA-2008:121", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://secunia.com/advisories/30967", "name": "30967", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "name": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/30819", "name": "30819", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/31711", "name": "31711", "tags": [], "refsource": "SECUNIA"}, {"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html", "name": "APPLE-SA-2008-09-12", "tags": [], "refsource": "APPLE"}, {"url": "http://secunia.com/advisories/31856", "name": "31856", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/31900", "name": "31900", "tags": [], "refsource": "SECUNIA"}, {"url": "http://support.apple.com/kb/HT3129", "name": "http://support.apple.com/kb/HT3129", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.ubuntu.com/usn/usn-643-1", "name": "USN-643-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://secunia.com/advisories/31823", "name": "31823", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/31577", "name": "31577", "tags": [], "refsource": "SECUNIA"}, {"url": "http://support.apple.com/kb/HT3026", "name": "http://support.apple.com/kb/HT3026", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/31479", "name": "31479", "tags": [], "refsource": "SECUNIA"}, {"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255", "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255", "tags": [], "refsource": "CONFIRM"}, {"url": "https://issues.rpath.com/browse/RPL-2608", "name": "https://issues.rpath.com/browse/RPL-2608", "tags": [], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "name": "APPLE-SA-2009-02-12", "tags": [], "refsource": "APPLE"}, {"url": "http://secunia.com/advisories/33937", "name": "33937", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/35204", "name": "35204", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html", "name": "RHSA-2009:0329", "tags": [], "refsource": "REDHAT"}, {"url": "http://support.apple.com/kb/HT3438", "name": "http://support.apple.com/kb/HT3438", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vupen.com/english/advisories/2008/2558", "name": "ADV-2008-2558", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/2525", "name": "ADV-2008-2525", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/2423", "name": "ADV-2008-2423", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/2466", "name": "ADV-2008-2466", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/1876/references", "name": "ADV-2008-1876", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2008/1794", "name": "ADV-2008-1794", "tags": [], "refsource": "VUPEN"}, {"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "name": "GLSA-201209-25", "tags": [], "refsource": "GENTOO"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188", "name": "oval:org.mitre.oval:def:11188", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded", "name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded", "name": "20080814 rPSA-2008-0255-1 freetype", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-189"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-1808", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2008-06-16T19:41Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-01-26T12:41Z"}