First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way TrueType bytecode / opcode interpreter of the FreeType font rendering engine performed moving of zone2 pointer point by execution of 'SHift Contour' (SHC) instruction. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35689">https://savannah.nongnu.org/bugs/?35689</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0fc8debeb6c2f6a8a9a2b97332a7c8a0a1bd9e85">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0fc8debeb6c2f6a8a9a2b97332a7c8a0a1bd9e85</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Freetype Freetype | <=2.4.8 | |
Freetype Freetype | =1.3.1 | |
Freetype Freetype | =2.0.0 | |
Freetype Freetype | =2.0.1 | |
Freetype Freetype | =2.0.2 | |
Freetype Freetype | =2.0.3 | |
Freetype Freetype | =2.0.4 | |
Freetype Freetype | =2.0.5 | |
Freetype Freetype | =2.0.6 | |
Freetype Freetype | =2.0.7 | |
Freetype Freetype | =2.0.8 | |
Freetype Freetype | =2.0.9 | |
Freetype Freetype | =2.1 | |
Freetype Freetype | =2.1.3 | |
Freetype Freetype | =2.1.4 | |
Freetype Freetype | =2.1.5 | |
Freetype Freetype | =2.1.6 | |
Freetype Freetype | =2.1.7 | |
Freetype Freetype | =2.1.8 | |
Freetype Freetype | =2.1.8-rc1 | |
Freetype Freetype | =2.1.9 | |
Freetype Freetype | =2.1.10 | |
Freetype Freetype | =2.2.0 | |
Freetype Freetype | =2.2.1 | |
Freetype Freetype | =2.3.0 | |
Freetype Freetype | =2.3.1 | |
Freetype Freetype | =2.3.2 | |
Freetype Freetype | =2.3.3 | |
Freetype Freetype | =2.3.4 | |
Freetype Freetype | =2.3.5 | |
Freetype Freetype | =2.3.6 | |
Freetype Freetype | =2.3.7 | |
Freetype Freetype | =2.3.8 | |
Freetype Freetype | =2.3.9 | |
Freetype Freetype | =2.3.10 | |
Freetype Freetype | =2.3.11 | |
Freetype Freetype | =2.3.12 | |
Freetype Freetype | =2.4.0 | |
Freetype Freetype | =2.4.1 | |
Freetype Freetype | =2.4.2 | |
Freetype Freetype | =2.4.3 | |
Freetype Freetype | =2.4.4 | |
Freetype Freetype | =2.4.5 | |
Freetype Freetype | =2.4.6 | |
Freetype Freetype | =2.4.7 | |
Mozilla Firefox Mobile | <=10.0.3 | |
Mozilla Firefox Mobile | =1.0 | |
Mozilla Firefox Mobile | =4.0 | |
Mozilla Firefox Mobile | =4.0-beta1 | |
Mozilla Firefox Mobile | =4.0-beta2 | |
Mozilla Firefox Mobile | =4.0-beta3 | |
Mozilla Firefox Mobile | =4.0-beta4 | |
Mozilla Firefox Mobile | =5.0 | |
Mozilla Firefox Mobile | =6.0 | |
Mozilla Firefox Mobile | =6.0.1 | |
Mozilla Firefox Mobile | =6.0.2 | |
Mozilla Firefox Mobile | =7.0 | |
Mozilla Firefox Mobile | =8.0 | |
Mozilla Firefox Mobile | =9.0 | |
Mozilla Firefox Mobile | =10.0 | |
Mozilla Firefox Mobile | =10.0.1 | |
Mozilla Firefox Mobile | =10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.