First published: Mon Mar 06 2017(Updated: )
The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <2.7.1 | |
Debian GNU/Linux | =8.0 | |
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10244 is classified with a medium severity score due to its potential for causing denial of service through heap-based buffer over-read.
To mitigate CVE-2016-10244, upgrade FreeType to version 2.7.1 or later, or apply relevant patches that address this vulnerability.
CVE-2016-10244 occurs due to the parse_charstrings function failing to verify that a font file contains a glyph name, leading to buffer over-read issues.
CVE-2016-10244 affects FreeType versions prior to 2.7.1, and may also impact certain versions of Android and Debian Linux.
While CVE-2016-10244 primarily poses a risk of denial of service, it could potentially allow for further exploitation depending on the attack vector.