Skip to main content

FreeType Multilpe Vulnerabilities

Last Update Date: 8 Mar 2012 12:14 Release Date: 8 Mar 2012 5208 Views

RISK: High Risk

TYPE: Operating Systems - Linux

TYPE: Linux

Multiple vulnerabilities have been identified in FreeType, which can be exploited by malicious people to potentially compromise an application using the library.

  1. An error in src/type1/t1parse.c when processing dictionaries can be exploited to cause heap-based memory corruption via a specially crafted Type1 font file.
  2. An error in src/bdf/bdflib.c when processing the encoding field can be exploited to cause heap-based memory corruption via a specially crafted Bitmap Distribution Format (BDF) font file.
  3. An error in src/winfonts/winfnt.c when processing the number of glyphs can be exploited to cause heap-based memory corruption via a specially crafted TrueType font file.
  4. An error in src/truetype/ttgload.c when handling the zone2 pointer point can be exploited to cause heap-based memory corruption via a specially crafted TrueType font file.
  5. An error in src/bdf/bdflib.c when processing negative encoding values can be exploited to cause heap-based memory corruption via a specially crafted Bitmap Distribution Format (BDF) font file.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • FreeType 2.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Fixed in the GIT repository

Vulnerability Identifier


Source


Related Link