Date: 19 May 2006 SecWatch ID: 1014111 Vendor URL: http://www.freetype.org/ Original Advisory: http://sourceforge.n...hp?release_id=416463 Description: A vulnerability in FreeType has been reported, which can be exploited by remote users to trigger denial of service conditions and potentially compromise applications using the library. The vulnerability is caused due to an integer overflow error within the "read_lwfn()" function in src/base/ftmac.c. This can potentially be exploited to cause a heap-based buffer overflow via a specially crafted LWFN file. Affected: FreeType version 2.2. Prior versions may also be affected. Solution: The vulnerability has been fixed in version 2.2.1, available: http://sourceforge.net/project...up_id=3157&package_id=3121 Credits: Reported by vendor. Rgds Daxomatic
*** This bug has been marked as a duplicate of 124828 ***