#VU45484 Heap-based buffer overflow in FreeType - CVE-2010-3311
Published: January 8, 2011 / Updated: July 19, 2021
Vulnerability identifier: #VU45484
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2010-3311
CWE-ID: CWE-122
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
FreeType
FreeType
Software vendor:
freetype.org
freetype.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4. A remote attacker can use a crafted Compact Font Format to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
External links
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
- http://secunia.com/advisories/48951
- http://www.debian.org/security/2010/dsa-2116
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
- http://www.redhat.com/support/errata/RHSA-2010-0864.html
- http://www.securityfocus.com/bid/43700
- http://www.ubuntu.com/usn/USN-1013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=623625
- https://rhn.redhat.com/errata/RHSA-2010-0736.html
- https://rhn.redhat.com/errata/RHSA-2010-0737.html