First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer read flaw was found in the way TrueType bytecode / opcode interpreter of FreeType font rendering engine executed the 'Move Indirect Relative Point' (MIRP) instruction. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35646">https://savannah.nongnu.org/bugs/?35646</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a33c013fe2dc6e65de2879682201d9c155292349">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a33c013fe2dc6e65de2879682201d9c155292349</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <=2.4.8 | |
FreeType | =1.3.1 | |
FreeType | =2.0.0 | |
FreeType | =2.0.1 | |
FreeType | =2.0.2 | |
FreeType | =2.0.3 | |
FreeType | =2.0.4 | |
FreeType | =2.0.5 | |
FreeType | =2.0.6 | |
FreeType | =2.0.7 | |
FreeType | =2.0.8 | |
FreeType | =2.0.9 | |
FreeType | =2.1 | |
FreeType | =2.1.3 | |
FreeType | =2.1.4 | |
FreeType | =2.1.5 | |
FreeType | =2.1.6 | |
FreeType | =2.1.7 | |
FreeType | =2.1.8 | |
FreeType | =2.1.8-rc1 | |
FreeType | =2.1.9 | |
FreeType | =2.1.10 | |
FreeType | =2.2.0 | |
FreeType | =2.2.1 | |
FreeType | =2.3.0 | |
FreeType | =2.3.1 | |
FreeType | =2.3.2 | |
FreeType | =2.3.3 | |
FreeType | =2.3.4 | |
FreeType | =2.3.5 | |
FreeType | =2.3.6 | |
FreeType | =2.3.7 | |
FreeType | =2.3.8 | |
FreeType | =2.3.9 | |
FreeType | =2.3.10 | |
FreeType | =2.3.11 | |
FreeType | =2.3.12 | |
FreeType | =2.4.0 | |
FreeType | =2.4.1 | |
FreeType | =2.4.2 | |
FreeType | =2.4.3 | |
FreeType | =2.4.4 | |
FreeType | =2.4.5 | |
FreeType | =2.4.6 | |
FreeType | =2.4.7 | |
Mozilla Firefox | <=10.0.3 | |
Mozilla Firefox | =1.0 | |
Mozilla Firefox | =4.0 | |
Mozilla Firefox | =4.0-beta1 | |
Mozilla Firefox | =4.0-beta2 | |
Mozilla Firefox | =4.0-beta3 | |
Mozilla Firefox | =4.0-beta4 | |
Mozilla Firefox | =5.0 | |
Mozilla Firefox | =6.0 | |
Mozilla Firefox | =6.0.1 | |
Mozilla Firefox | =6.0.2 | |
Mozilla Firefox | =7.0 | |
Mozilla Firefox | =8.0 | |
Mozilla Firefox | =9.0 | |
Mozilla Firefox | =10.0 | |
Mozilla Firefox | =10.0.1 | |
Mozilla Firefox | =10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1138 is classified as a moderate severity vulnerability due to the potential for information disclosure and Denial of Service attacks.
To fix CVE-2012-1138, it is recommended to update FreeType to version 2.4.9 or later.
CVE-2012-1138 affects FreeType versions up to and including 2.4.8 as well as specific older versions.
Yes, CVE-2012-1138 can be exploited remotely by attackers through specially crafted font files.
Applications that utilize the FreeType font rendering engine to process fonts are affected by CVE-2012-1138.