Package: freetype
Severity: grave
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2007-3506 [0]:

The ft_bitmap_assure_buffer function in src/base/ftbimap.c in FreeType
2.3.3 allows context-dependent attackers to cause a denial of service
and possibly execute arbitrary code via unspecified vectors involving
bitmap fonts, related to a "memory buffer overwrite bug."

This vulnerability may allow access to the accounts of users who use the
package.  The original bug report [1] provides instructions on how to
reproduce the issue, but I have been unable to do so.  The CVE links to
a patch from freetype's CVS [2]; the code appears to have changed
between Debian's 2.2 and upstream's 2.3 enough that I can't locate where
in ftbitmap.c the offending code exists (if at all).

If this does turn out to affect Debian's version, please note the CVE in
the changelog.

Thanks,

Alec

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506
[1] http://savannah.nongnu.org/bugs/index.php?19536
[2] 
http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18&diff_format=u

- -- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.18-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGjnKrAud/2YgchcQRAp2sAJ4mMhM+ovCOQ+PczjdsL5AjB+PzFACgjGJu
xU+tJZN4TvZ6hShfJm1o0RA=
=GVM+
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to