9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
freetype is vulnerable to arbitrary code execution. Two stack overflow flaws were found in the way the FreeType font engineprocessed certain Compact Font Format (CFF) character strings (opcodes). If a user loaded a specially-crafted font file with an application linked against FreeType, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application.
freetype.sourceforge.net/index2.html#release-freetype-2.4.2
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc
lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
osvdb.org/66828
secunia.com/advisories/40807
secunia.com/advisories/40816
secunia.com/advisories/40982
secunia.com/advisories/48951
sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
support.apple.com/kb/HT4291
support.apple.com/kb/HT4292
www.exploit-db.com/exploits/14538
www.f-secure.com/weblog/archives/00002002.html
www.redhat.com/security/updates/classification/#important
www.securityfocus.com/bid/42151
www.ubuntu.com/usn/USN-972-1
www.vupen.com/english/advisories/2010/2018
www.vupen.com/english/advisories/2010/2106
access.redhat.com/errata/RHSA-2010:0607
bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
bugzilla.redhat.com/show_bug.cgi?id=621144
exchange.xforce.ibmcloud.com/vulnerabilities/60856