Release date:
Updated on:
Affected Systems:
FreeType 2.4.8
FreeType 2.4.7
FreeType 2.4.5
FreeType 2.4.3
FreeType 2.4.2
FreeType 2.4.
FreeType 2.3.9
FreeType 2.3.6
FreeType 2.3.5
FreeType 2.3.4
FreeType 2.3.3
FreeType 2.3.11
FreeType 2.2.10
FreeType 2.2.1
FreeType 2.2.
FreeType 2.1.9
FreeType 2.1.7
FreeType 2.1.10
FreeType 2.0.9
FreeType 2.0.6
FreeType 1.3.1
FreeType 0
Unaffected system:
FreeType 2.4.9
Description:
--------------------------------------------------------------------------------
Bugtraq id: 52318
CVE (CAN) ID: CVE-2012-1126, CVE-2012-1127, CVE-2012-1128, CVE-2012-1129, CVE-2012-1130, CVE-2012-1131, CVE-2012-1132, CVE-2012-1133, CVE-2012-1134, CVE-2012-1135, CVE-2012-1136, CVE-2012-1137, CVE-2012-1138, CVE-2012-1139, CVE-2012-1140, CVE-2012-1143, CVE-2012-1144
FreeType is a popular font function library.
In versions earlier than FreeType 2.4.9, multiple heap buffer overflow vulnerabilities, stack buffer overflow vulnerabilities, and DoS Vulnerabilities exist. Remote attackers can exploit these vulnerabilities to execute arbitrary code or cause DoS attacks.
<* Source: Mateusz Jurczyk
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
FreeType
--------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.freetype.org/