It is possible for a UTF8 string with invalid sequences to trigger a heap
overflow of converted Unicode data. Exploitability would depend on the attackers
ability to get the string into the buggy converter. General web content is
converted elsewhere but we can't rule out the possibility of a successful attack.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.