First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way FreeType font rendering engine performed parsing of glyph and bitmaps information for glyph bitmap distribution format (BDF) font files, that were missing definition of the ENCODING field. A remote attacker could provide a specially-crafted BDF font file, which once opened in an application linked against FreeType would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35641">https://savannah.nongnu.org/bugs/?35641</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=4086fb7caf41e33137e548e43a49a97b127cd369">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=4086fb7caf41e33137e548e43a49a97b127cd369</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-800594 is considered critical due to the potential for remote code execution.
To fix REDHAT-BUG-800594, update FreeType to the latest patched version that addresses the buffer write flaw.
The impact of REDHAT-BUG-800594 includes the possibility for remote attackers to execute arbitrary code on affected systems.
FreeType versions prior to the fix for REDHAT-BUG-800594 are affected by this vulnerability.
Yes, REDHAT-BUG-800594 can be exploited remotely by providing specially-crafted BDF font files.