Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 134011 - media-libs/freetype FreeType "read_lwfn()" Integer Overflow Vulnerability
Summary: media-libs/freetype FreeType "read_lwfn()" Integer Overflow Vulnerability
Status: RESOLVED DUPLICATE of bug 124828
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://sourceforge.net/project/showno...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-05-22 02:28 UTC by Dax
Modified: 2006-05-22 07:35 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dax 2006-05-22 02:28:10 UTC
Date:        	19 May 2006
SecWatch ID:       	1014111
Vendor URL:       	http://www.freetype.org/
Original Advisory:       	http://sourceforge.n...hp?release_id=416463

Description:
A vulnerability in FreeType has been reported, which can be exploited by remote users to trigger denial of service conditions and potentially compromise applications using the library.

The vulnerability is caused due to an integer overflow error within the "read_lwfn()" function in src/base/ftmac.c. This can potentially be exploited to cause a heap-based buffer overflow via a specially crafted LWFN file.


Affected:
FreeType version 2.2. Prior versions may also be affected.


Solution:
The vulnerability has been fixed in version 2.2.1, available:
http://sourceforge.net/project...up_id=3157&package_id=3121


Credits:
Reported by vendor.


Rgds
Daxomatic
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-05-22 07:35:32 UTC

*** This bug has been marked as a duplicate of 124828 ***