<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2010-1797</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2010-1797</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>18</Number>
        <Date>2024-07-27T01:44:10Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T12:51:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-27T01:44:10Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2010-1797</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSXFHANA6PYQY7T3E6HMSFOOW3UB6V2I/#FSXFHANA6PYQY7T3E6HMSFOOW3UB6V2I</URL>
      <Description>E-Mail link for SUSE-SR:2010:016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2012-April/000094.html</URL>
      <Description>E-Mail link for SUSE-SU-2012:0553-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11" CPE="cpe:/o:suse:suse_sles:11">SUSE Linux Enterprise Server 11</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP1 for Teradata">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP1 for Teradata">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1 for Teradata" CPE="cpe:/o:suse:suse_sles_teradata:11:sp1">SUSE Linux Enterprise Server 11 SP1 for Teradata</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP1-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP1-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-TERADATA" CPE="cpe:/o:suse:sles:11:sp1:teradata">SUSE Linux Enterprise Server 11 SP1-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4 LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4 LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp4">SUSE Linux Enterprise Server 11 SP4 LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11" CPE="cpe:/o:suse:sles_sap:11">SUSE Linux Enterprise Server for SAP Applications 11</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="firefox-freetype2">
      <FullProductName ProductID="firefox-freetype2" CPE="cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*">firefox-freetype2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-2.3.7-25.11.1">
      <FullProductName ProductID="freetype2-2.3.7-25.11.1" CPE="cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*">freetype2-2.3.7-25.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-32bit-2.3.7-25.11.1">
      <FullProductName ProductID="freetype2-32bit-2.3.7-25.11.1">freetype2-32bit-2.3.7-25.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-x86-2.3.7-25.11.1">
      <FullProductName ProductID="freetype2-x86-2.3.7-25.11.1">freetype2-x86-2.3.7-25.11.1</FullProductName>
    </Branch>
    <Relationship ProductReference="freetype2-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11:freetype2-2.3.7-25.11.1">freetype2-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server 11</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-32bit-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11:freetype2-32bit-2.3.7-25.11.1">freetype2-32bit-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server 11</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-x86-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11:freetype2-x86-2.3.7-25.11.1">freetype2-x86-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server 11</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-TERADATA:freetype2-2.3.7-25.11.1">freetype2-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server 11 SP1-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-32bit-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-TERADATA:freetype2-32bit-2.3.7-25.11.1">freetype2-32bit-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server 11 SP1-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11:freetype2-2.3.7-25.11.1">freetype2-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-32bit-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11:freetype2-32bit-2.3.7-25.11.1">freetype2-32bit-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-x86-2.3.7-25.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11:freetype2-x86-2.3.7-25.11.1">freetype2-x86-2.3.7-25.11.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11</FullProductName>
    </Relationship>
    <Relationship ProductReference="firefox-freetype2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1 for Teradata">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1 for Teradata:firefox-freetype2">firefox-freetype2 as a component of SUSE Linux Enterprise Server 11 SP1 for Teradata</FullProductName>
    </Relationship>
    <Relationship ProductReference="firefox-freetype2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS:firefox-freetype2">firefox-freetype2 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2010-1797</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11:freetype2-2.3.7-25.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11:freetype2-32bit-2.3.7-25.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11:freetype2-x86-2.3.7-25.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-TERADATA:freetype2-2.3.7-25.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-TERADATA:freetype2-32bit-2.3.7-25.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11:freetype2-2.3.7-25.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11:freetype2-32bit-2.3.7-25.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11:freetype2-x86-2.3.7-25.11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>9.3</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
