Bug 800607 (CVE-2012-1144) - CVE-2012-1144 freetype: insufficient checking of first outline point in TTF parser (#35689)
Summary: CVE-2012-1144 freetype: insufficient checking of first outline point in TTF p...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-1144
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20120302,repo...
Depends On: 806266 806267 806268 806269 806270 806271 889398
Blocks: 800639
TreeView+ depends on / blocked
 
Reported: 2012-03-06 19:00 UTC by Jan Lieskovsky
Modified: 2019-06-08 19:04 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-02-24 21:02:16 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0467 normal SHIPPED_LIVE Important: freetype security update 2012-04-10 23:55:00 UTC

Description Jan Lieskovsky 2012-03-06 19:00:00 UTC
An out-of heap-based buffer write flaw was found in the way TrueType bytecode / opcode interpreter of the FreeType font rendering engine performed moving of zone2 pointer point by execution of 'SHift Contour' (SHC) instruction. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application.

Upstream bug report:
[1] https://savannah.nongnu.org/bugs/?35689

Upstream patch:
[2] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0fc8debeb6c2f6a8a9a2b97332a7c8a0a1bd9e85

Acknowledgements:

Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.

Comment 1 Kurt Seifried 2012-03-06 20:58:55 UTC
Added CVE as per http://www.openwall.com/lists/oss-security/2012/03/06/16

Comment 2 Tomas Hoger 2012-03-22 11:19:22 UTC
(In reply to comment #0)
> An out-of heap-based buffer write flaw was found in the way TrueType bytecode /
> opcode interpreter of the FreeType font rendering engine performed moving of
> zone2 pointer point by execution of 'SHift Contour' (SHC) instruction.

Bytecode interpreter (BCI) is where the problem surfaced, but it was addressed in a TTF loading code that is not BCI specific.  BCI support is disabled in Red Hat Enterprise Linux freetype packages and is only enabled upstream by default starting with version 2.4.

Comment 7 Tomas Hoger 2012-03-23 11:12:55 UTC
Created mingw32-freetype tracking bugs for this issue

Affects: fedora-all [bug 806271]

Comment 8 Tomas Hoger 2012-03-23 11:12:59 UTC
Created freetype tracking bugs for this issue

Affects: fedora-all [bug 806270]

Comment 10 errata-xmlrpc 2012-04-10 19:59:27 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2012:0467 https://rhn.redhat.com/errata/RHSA-2012-0467.html


Note You need to log in before you can comment on or make changes to this bug.