First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way FreeType font rendering engine performed parsing of glyph and bitmaps information for glyph bitmap distribution format (BDF) font files, that were missing definition of the ENCODING field. A remote attacker could provide a specially-crafted BDF font file, which once opened in an application linked against FreeType would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35641">https://savannah.nongnu.org/bugs/?35641</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=4086fb7caf41e33137e548e43a49a97b127cd369">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=4086fb7caf41e33137e548e43a49a97b127cd369</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <=2.4.8 | |
FreeType | =1.3.1 | |
FreeType | =2.0.0 | |
FreeType | =2.0.1 | |
FreeType | =2.0.2 | |
FreeType | =2.0.3 | |
FreeType | =2.0.4 | |
FreeType | =2.0.5 | |
FreeType | =2.0.6 | |
FreeType | =2.0.7 | |
FreeType | =2.0.8 | |
FreeType | =2.0.9 | |
FreeType | =2.1 | |
FreeType | =2.1.3 | |
FreeType | =2.1.4 | |
FreeType | =2.1.5 | |
FreeType | =2.1.6 | |
FreeType | =2.1.7 | |
FreeType | =2.1.8 | |
FreeType | =2.1.8-rc1 | |
FreeType | =2.1.9 | |
FreeType | =2.1.10 | |
FreeType | =2.2.0 | |
FreeType | =2.2.1 | |
FreeType | =2.3.0 | |
FreeType | =2.3.1 | |
FreeType | =2.3.2 | |
FreeType | =2.3.3 | |
FreeType | =2.3.4 | |
FreeType | =2.3.5 | |
FreeType | =2.3.6 | |
FreeType | =2.3.7 | |
FreeType | =2.3.8 | |
FreeType | =2.3.9 | |
FreeType | =2.3.10 | |
FreeType | =2.3.11 | |
FreeType | =2.3.12 | |
FreeType | =2.4.0 | |
FreeType | =2.4.1 | |
FreeType | =2.4.2 | |
FreeType | =2.4.3 | |
FreeType | =2.4.4 | |
FreeType | =2.4.5 | |
FreeType | =2.4.6 | |
FreeType | =2.4.7 | |
Mozilla Firefox | <=10.0.3 | |
Mozilla Firefox | =1.0 | |
Mozilla Firefox | =4.0 | |
Mozilla Firefox | =4.0-beta1 | |
Mozilla Firefox | =4.0-beta2 | |
Mozilla Firefox | =4.0-beta3 | |
Mozilla Firefox | =4.0-beta4 | |
Mozilla Firefox | =5.0 | |
Mozilla Firefox | =6.0 | |
Mozilla Firefox | =6.0.1 | |
Mozilla Firefox | =6.0.2 | |
Mozilla Firefox | =7.0 | |
Mozilla Firefox | =8.0 | |
Mozilla Firefox | =9.0 | |
Mozilla Firefox | =10.0 | |
Mozilla Firefox | =10.0.1 | |
Mozilla Firefox | =10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1136 has a moderate severity rating due to its potential for privilege escalation.
To fix CVE-2012-1136, update FreeType to a version that is 2.4.9 or later.
CVE-2012-1136 affects multiple versions of FreeType and certain versions of Mozilla Firefox Mobile.
Yes, CVE-2012-1136 can be exploited remotely, allowing attackers to execute arbitrary code.
The vulnerability in CVE-2012-1136 is an out-of-bounds write flaw in the FreeType font rendering engine.