Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-972-1 | Third Party Advisory |
http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2 | Release Notes Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2010-0578.html | Third Party Advisory |
http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=617342 | Issue Tracking Patch Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2010-0577.html | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019 | Issue Tracking Release Notes Third Party Advisory |
http://secunia.com/advisories/40982 | Third Party Advisory |
http://securitytracker.com/id?1024266 | Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2010/2106 | Third Party Advisory |
http://secunia.com/advisories/48951 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2010-08-19 11:00
Updated : 2021-04-06 05:52
NVD link : CVE-2010-2541
Mitre link : CVE-2010-2541
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
canonical
- ubuntu_linux
freetype
- freetype