First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer read flaw was found in the way FreeType font rendering engine performed parsing of glyph information and relevant bitmaps for glyph bitmap distribution format (BDF). A remote attacker could provide a specially-crafted BDF font file, which once opened in an application linked against FreeType would lead to that application crash. Upstream bug reports: [1] <a href="https://savannah.nongnu.org/bugs/?35599">https://savannah.nongnu.org/bugs/?35599</a> [2] <a href="https://savannah.nongnu.org/bugs/?35600">https://savannah.nongnu.org/bugs/?35600</a> Upstream patch: [3] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0b1c0c6b20bf121096afff206d570f26183402b3">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0b1c0c6b20bf121096afff206d570f26183402b3</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-800583 is classified as high due to the potential for remote code execution through specially-crafted BDF font files.
To fix REDHAT-BUG-800583, update FreeType to the latest version that addresses the buffer read flaw.
The potential impacts of REDHAT-BUG-800583 include arbitrary code execution on affected systems when processing maliciously crafted font files.
The software affected by REDHAT-BUG-800583 is the FreeType font rendering engine.
Yes, REDHAT-BUG-800583 can be exploited remotely through the use of specially-crafted BDF font files.