First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way Type1 font parser of the FreeType font rendering engine retrieved private dictionar information for certain Type1 fonts. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash, or, potentially, arbitrary code execution with the privileges of the user running the application. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35608">https://savannah.nongnu.org/bugs/?35608</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=d9577add645c8c05460c7d60ad486c021394b82e">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=d9577add645c8c05460c7d60ad486c021394b82e</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-800592 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix REDHAT-BUG-800592, update your FreeType installation to the latest version that includes the security patch.
REDHAT-BUG-800592 affects applications that use the FreeType font rendering engine with vulnerabilities in the Type1 font parser.
Yes, a remote attacker can exploit REDHAT-BUG-800592 by providing a specially-crafted font file.
REDHAT-BUG-800592 is an out-of-heap-based buffer write flaw that can lead to memory corruption.