First published: Thu Jan 20 2011(Updated: )
A heap-based buffer overflow, leading to array index error was found in the way the Pango font rendering library rendered glyph box for certain FT_Bitmap objects, when the FreeType2 Pango back end was used for rendering. If an attacker created a specially-crafted font file and tricked a local, unsuspecting user into loading the font file in an application that uses the Pango font rendering library and FreeType2 Pango back end was used for rendering, it could cause that application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. References: [1] <a href="https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616">https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616</a> CVE Request: [2] <a href="http://www.openwall.com/lists/oss-security/2011/01/18/6">http://www.openwall.com/lists/oss-security/2011/01/18/6</a> Public PoC: [3] <a href="https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/1">https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/1</a> (malicious font) [4] <a href="https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/2">https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616/comments/2</a> (sample text file to trigger the crash)
Affected Software | Affected Version | How to fix |
---|---|---|
Gnome Pango | ||
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.