First published: Thu Jan 20 2011(Updated: )
A heap-based buffer overflow, leading to array index error was found in the way the Pango font rendering library rendered glyph box for certain FT_Bitmap objects, when the FreeType2 Pango back end was used for rendering. If an attacker created a specially-crafted font file and tricked a local, unsuspecting user into loading the font file in an application that uses the Pango font rendering library and FreeType2 Pango back end was used for rendering, it could cause that application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. References: [1] <a href="https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616">https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616</a> CVE Request: [2] <a href="http://www.openwall.com/lists/oss-security/2011/01/18/6">http://www.openwall.com/lists/oss-security/2011/01/18/6</a> Public PoC: [3] <a href="https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/1">https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/1</a> (malicious font) [4] <a href="https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/2">https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/2</a> (sample text file to trigger the crash)
Affected Software | Affected Version | How to fix |
---|---|---|
Pango | ||
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-671122 is classified as a high severity vulnerability due to the heap-based buffer overflow it can cause.
To fix REDHAT-BUG-671122, ensure that you update Pango and FreeType to the latest versions provided by your distribution.
The potential impacts of REDHAT-BUG-671122 include application crashes and the execution of arbitrary code if exploited.
REDHAT-BUG-671122 affects users running the Pango font rendering library in conjunction with FreeType.
REDHAT-BUG-671122 is primarily a local vulnerability, but it can lead to remote exploitation if an attacker can trick a user into opening a crafted font file.