First published: Thu Aug 12 2010(Updated: )
Marc Schoenefeld found an input stream position error in the way FreeType font rendering engine processed input file streams. If a user loaded a specially-crafted font file with an application linked against FreeType and relevant font glyphs were subsequently rendered with the X FreeType library (libXft), it could cause the application to crash or, possibly execute arbitrary code (integer overflow leading to heap-based buffer overflow in the libXft library) with the privileges of the user running the application. Different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2010-1797">CVE-2010-1797</a>. Affected versions: freetype-2.3 and before that. Latest upstream version (2.4) is not affected
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | <2.3 | |
libXft | <2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-623625 is classified as important.
To fix REDHAT-BUG-623625, you should update to the latest version of FreeType or libXft that resolves the issue.
The potential impacts of REDHAT-BUG-623625 include application crashes and possible security vulnerabilities when processing specially-crafted font files.
REDHAT-BUG-623625 affects FreeType versions up to 2.3 and X.Org libXft versions up to 2.3.
The REDHAT-BUG-623625 vulnerability was reported by Marc Schoenefeld.