First published: Tue Mar 06 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way FreeType font rendering engine performed computation of advance width values for certain glyph outlines. A remote attacker could provide a specially-crafted TrueType font file, which once opened in an application linked against FreeType would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35659">https://savannah.nongnu.org/bugs/?35659</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d35a7dc7cc621538a1f4a63c83ebf223aace0b0">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d35a7dc7cc621538a1f4a63c83ebf223aace0b0</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-800604 is categorized as high due to the potential for remote code execution.
To fix REDHAT-BUG-800604, update your FreeType version to the latest patched release provided by your distribution.
REDHAT-BUG-800604 affects applications linked against vulnerable versions of the FreeType font rendering engine.
REDHAT-BUG-800604 is a heap-based buffer write flaw caused by incorrect handling of advance width values in certain TrueType fonts.
Yes, REDHAT-BUG-800604 can be exploited remotely by an attacker through specially-crafted TrueType font files.