In association with heise online

22 May 2007, 12:41

Security hole in FreeType

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Manipulated True Type fonts could cause an integer overflow in the FreeType library, leading to subsequent arbitrary code execution. Applications such as web browsers that are linked to the library may either crash when trying to integrate manipulated TTF files or execute arbitrary code with user privileges.

The FreeType developers have already fixed this bug in the function TT_Load_Simple_Glyph() from the file ttgload.c in the version control system. So far, Linux distributors have not provided updated FreeType packages. Users are advised to install them immediately as soon as they are available.

See also:

  • Bug in fuzzed TTF file, advisory on the FreeType developer mailing list
  • [ http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?roo t=freetype&r1=1.177&r2=1.178 Patch] in the FreeType version control system

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-732917
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit