First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer read flaw was found in the way TrueType bytecode / opcode interpreter of the FreeType font rendering engine performed execution of NPUSHB and NPUSHW instructions. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35640">https://savannah.nongnu.org/bugs/?35640</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5dddcc45a03b336860436a180aec5b358517336b">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5dddcc45a03b336860436a180aec5b358517336b</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-800593 is classified as a critical vulnerability due to its potential exploitation by remote attackers.
To fix REDHAT-BUG-800593, update to the latest version of the FreeType library that addresses this specific buffer read flaw.
REDHAT-BUG-800593 could be exploited via specially-crafted font files that trigger the buffer read flaw when opened by vulnerable applications.
Affected versions include those prior to the patch release that fixes the buffer read vulnerability in the TrueType bytecode interpreter.
The impacts of REDHAT-BUG-800593 include potential remote code execution and unauthorized access to system resources.