Search for vulnerabilities
Vulnerability details: VCID-hd2g-w8r7-aaak
Vulnerability ID VCID-hd2g-w8r7-aaak
Aliases CVE-2011-0226
Summary Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
Status Published
Exploitability 0.5
Weighted Severity 8.4
Risk 4.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 7.5 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
generic_textual HIGH http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
rhas Important https://access.redhat.com/errata/RHSA-2011:1085
epss 0.04609 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.04609 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.04609 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.04609 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.05830 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.0845 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.10943 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
epss 0.16991 https://api.first.org/data/v1/epss?cve=CVE-2011-0226
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=722701
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2011-0226
generic_textual MODERATE http://support.apple.com/kb/HT5002
Reference id Reference type URL
http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html
http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json
https://api.first.org/data/v1/epss?cve=CVE-2011-0226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226
http://secunia.com/advisories/45167
http://secunia.com/advisories/45224
http://support.apple.com/kb/HT4802
http://support.apple.com/kb/HT4803
http://support.apple.com/kb/HT5002
http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html
http://www.debian.org/security/2011/dsa-2294
http://www.mandriva.com/security/advisories?name=MDVSA-2011:120
http://www.redhat.com/support/errata/RHSA-2011-1085.html
http://www.securityfocus.com/bid/48619
635871 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871
722701 https://bugzilla.redhat.com/show_bug.cgi?id=722701
CVE-2011-0226 https://nvd.nist.gov/vuln/detail/CVE-2011-0226
GLSA-201201-09 https://security.gentoo.org/glsa/201201-09
RHSA-2011:1085 https://access.redhat.com/errata/RHSA-2011:1085
USN-1173-1 https://usn.ubuntu.com/1173-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2011-0226
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.92452
EPSS Score 0.04609
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.