9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
freetype is vulnerable to arbitrary code execution. The vulnerability exists as it was discovered that the FreeType font rendering engine improperly validated certain position values when processing input streams. If a user loaded a specially-crafted font file with an application linked against FreeType, and the relevant font glyphs were subsequently rendered with the X FreeType library (libXft), it could trigger a heap-based buffer overflow in the libXft library, causing the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application.
lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
secunia.com/advisories/48951
www.debian.org/security/2010/dsa-2116
www.mandriva.com/security/advisories?name=MDVSA-2010:201
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0864.html
www.securityfocus.com/bid/43700
www.ubuntu.com/usn/USN-1013-1
access.redhat.com/errata/RHSA-2010:0736
access.redhat.com/errata/RHSA-2010:0737
access.redhat.com/errata/RHSA-2010:0864
access.redhat.com/security/cve/CVE-2010-3311
bugzilla.redhat.com/show_bug.cgi?id=623625
rhn.redhat.com/errata/RHSA-2010-0736.html
rhn.redhat.com/errata/RHSA-2010-0737.html