CVE-2010-3814
Published: 22 October 2010
Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
Notes
Author | Note |
---|---|
mdeslaur | dapper doesn't look affected |
Priority
Status
Package | Release | Status |
---|---|---|
freetype Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(2.1.10-1ubuntu2.8)
|
hardy |
Released
(2.3.5-1ubuntu4.8.04.6)
|
|
jaunty |
Ignored
(end of life)
|
|
karmic |
Released
(2.3.9-5ubuntu0.4)
|
|
lucid |
Released
(2.3.11-1ubuntu2.4)
|
|
maverick |
Released
(2.4.2-2ubuntu0.1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4 |