First published: Tue Mar 06 2012(Updated: )
An array index error, leading to out-of stack-based buffer read flaw was found in the way FreeType font rendering engine processed certain glyph information for glyph bitmap distribution format (BDF) font files. A remote attacker could provide a specially-crafted BDF font file, which once opened in an application linked against FreeType would lead to that application crash. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35656">https://savannah.nongnu.org/bugs/?35656</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6ac022dc750d95296a6f731b9594f2e751d997fa">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6ac022dc750d95296a6f731b9594f2e751d997fa</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-800598 is categorized as high due to its potential for remote exploitation.
To fix REDHAT-BUG-800598, update your FreeType package to the latest version recommended by your distribution.
REDHAT-BUG-800598 can lead to information disclosure vulnerabilities allowing attackers to read out of stack memory.
The affected software by REDHAT-BUG-800598 is the FreeType font rendering engine.
Yes, if exploited, REDHAT-BUG-800598 can allow a remote attacker to execute an attack through crafted BDF font files.