First published: Thu May 17 2007(Updated: )
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <=2.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2754 has a severity rating that allows remote attackers to execute arbitrary code, indicating it poses a high risk.
To fix CVE-2007-2754, update to FreeType version 2.3.5 or later where the vulnerability is patched.
FreeType versions up to and including 2.3.4 are affected by CVE-2007-2754.
CVE-2007-2754 allows remote attackers to craft a TTF image that can trigger an integer overflow and subsequently a heap-based buffer overflow.
Yes, CVE-2007-2754 is a known vulnerability that has been documented since its discovery.