First published: Mon Jun 16 2008(Updated: )
Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | =2.3.4 | |
FreeType | =2.3.5 | |
FreeType | =1.3.1 | |
FreeType | =2.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1806 is rated as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2008-1806, upgrade FreeType to version 2.3.6 or later.
CVE-2008-1806 affects FreeType versions 1.3.1 and 2.3.3 through 2.3.5.
CVE-2008-1806 allows context-dependent attackers to execute arbitrary code via specially crafted Printer Font Binary (PFB) files.
Yes, CVE-2008-1806 triggers a heap-based buffer overflow due to integer overflow.