An out-of heap-based buffer read flaw was found in the way FreeType font rendering engine retrieved properties information from Portable Compiled Format (PCF) bitmap font files. A remote attacker could provide a specially-crafted PCF font file, which once opened in an application linked against FreeType would lead to that application crash.
Upstream bug report:
Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Added CVE as per http://www.openwall.com/lists/oss-security/2012/03/06/16
This issue affects the versions of the freetype package, as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the versions of the freetype package, as shipped with Fedora release of 15 and 16.
The problem here is in pcf_get_properties(), which does not ensure that a string read form PCF font file is properly NUL terminated before passing it to strdup. This may possibly cause program crash.
This issue has been addressed in following products:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Via RHSA-2012:0467 https://rhn.redhat.com/errata/RHSA-2012-0467.html