#VU45484 Heap-based buffer overflow in FreeType - CVE-2010-3311
Published: January 8, 2011 / Updated: July 19, 2021
FreeType
freetype.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4. A remote attacker can use a crafted Compact Font Format to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
- http://secunia.com/advisories/48951
- http://www.debian.org/security/2010/dsa-2116
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
- http://www.redhat.com/support/errata/RHSA-2010-0864.html
- http://www.securityfocus.com/bid/43700
- http://www.ubuntu.com/usn/USN-1013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=623625
- https://rhn.redhat.com/errata/RHSA-2010-0736.html
- https://rhn.redhat.com/errata/RHSA-2010-0737.html