First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer read flaw was found in the way FreeType font rendering engine performed conversion of ASCII string objects, contained within glyph bitmap distribution format (BDF) font file, into signed short integers. A remote attacker could provide a specially-crafted BDF file, which once processed by an application linked against FreeType would lead to that application crash. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35658">https://savannah.nongnu.org/bugs/?35658</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=d9c1659610f9cd5e103790cb5963483d65cf0d2d">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=d9c1659610f9cd5e103790cb5963483d65cf0d2d</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Freetype Freetype | <=2.4.8 | |
Freetype Freetype | =1.3.1 | |
Freetype Freetype | =2.0.0 | |
Freetype Freetype | =2.0.1 | |
Freetype Freetype | =2.0.2 | |
Freetype Freetype | =2.0.3 | |
Freetype Freetype | =2.0.4 | |
Freetype Freetype | =2.0.5 | |
Freetype Freetype | =2.0.6 | |
Freetype Freetype | =2.0.7 | |
Freetype Freetype | =2.0.8 | |
Freetype Freetype | =2.0.9 | |
Freetype Freetype | =2.1 | |
Freetype Freetype | =2.1.3 | |
Freetype Freetype | =2.1.4 | |
Freetype Freetype | =2.1.5 | |
Freetype Freetype | =2.1.6 | |
Freetype Freetype | =2.1.7 | |
Freetype Freetype | =2.1.8 | |
Freetype Freetype | =2.1.8-rc1 | |
Freetype Freetype | =2.1.9 | |
Freetype Freetype | =2.1.10 | |
Freetype Freetype | =2.2.0 | |
Freetype Freetype | =2.2.1 | |
Freetype Freetype | =2.3.0 | |
Freetype Freetype | =2.3.1 | |
Freetype Freetype | =2.3.2 | |
Freetype Freetype | =2.3.3 | |
Freetype Freetype | =2.3.4 | |
Freetype Freetype | =2.3.5 | |
Freetype Freetype | =2.3.6 | |
Freetype Freetype | =2.3.7 | |
Freetype Freetype | =2.3.8 | |
Freetype Freetype | =2.3.9 | |
Freetype Freetype | =2.3.10 | |
Freetype Freetype | =2.3.11 | |
Freetype Freetype | =2.3.12 | |
Freetype Freetype | =2.4.0 | |
Freetype Freetype | =2.4.1 | |
Freetype Freetype | =2.4.2 | |
Freetype Freetype | =2.4.3 | |
Freetype Freetype | =2.4.4 | |
Freetype Freetype | =2.4.5 | |
Freetype Freetype | =2.4.6 | |
Freetype Freetype | =2.4.7 | |
Mozilla Firefox Mobile | <=10.0.3 | |
Mozilla Firefox Mobile | =1.0 | |
Mozilla Firefox Mobile | =4.0 | |
Mozilla Firefox Mobile | =4.0-beta1 | |
Mozilla Firefox Mobile | =4.0-beta2 | |
Mozilla Firefox Mobile | =4.0-beta3 | |
Mozilla Firefox Mobile | =4.0-beta4 | |
Mozilla Firefox Mobile | =5.0 | |
Mozilla Firefox Mobile | =6.0 | |
Mozilla Firefox Mobile | =6.0.1 | |
Mozilla Firefox Mobile | =6.0.2 | |
Mozilla Firefox Mobile | =7.0 | |
Mozilla Firefox Mobile | =8.0 | |
Mozilla Firefox Mobile | =9.0 | |
Mozilla Firefox Mobile | =10.0 | |
Mozilla Firefox Mobile | =10.0.1 | |
Mozilla Firefox Mobile | =10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.