First published: Fri Aug 06 2010(Updated: )
An array index error, leading to heap-based buffer overflow was found in the way the FreeType font rendering engine processed FontType42 font files with negative length of certain special font name table strings. An attacker could use this flaw to create a specially-crafted font file (which bypasses a size check and triggers a heap-based buffer overflow). Such file, when opened, would cause an application linked against libfreetype to crash, or, possibly execute arbitrary code. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?30656">https://savannah.nongnu.org/bugs/?30656</a> Public reproducer: [2] <a href="http://alt.swiecki.net/j/f/sigsegv29.ttf">http://alt.swiecki.net/j/f/sigsegv29.ttf</a> Upstream changeset: [3] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <2.4.2 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
iStyle @cosme iPhone OS | <4.2 | |
Apple iOS and macOS | <10.6.5 | |
tvOS | <4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2806 has a high severity due to the potential for heap-based buffer overflow attacks.
To fix CVE-2010-2806, update the FreeType library to version 2.4.2 or later.
CVE-2010-2806 affects software using FreeType versions prior to 2.4.2 and various versions of Ubuntu and macOS.
Yes, an attacker can exploit CVE-2010-2806 remotely by supplying a specially-crafted font file.
CVE-2010-2806 can lead to arbitrary code execution and potentially compromise affected systems.