[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-074 --- freetype

ID: oval:org.secpod.oval:def:19500064Date: (C)2023-06-12   (M)2024-03-06
Class: PATCHFamily: unix




A heap buffer overflow leading to out-of-bounds write was found in freetype. Memory allocation based on truncated PNG width and height values allows for an out-of-bounds write to occur in application memory when an attacker supplies a specially crafted TTF file. A heap buffer overflow flaw was found in Freetype's sfnt_init_face function in the sfobjs.c file. The vulnerability occurs when creating a face with a strange file and invalid index. This flaw allows an attacker to read and modify a small amount of memory, causing the application to crash. A segmentation fault was found in the FreeType library. This flaw allows an attacker to attempt access to a memory location in a way that could cause an application to halt or crash, leading to a denial of service. A segmentation fault was found in FreeType's FT_Request_Size function in the ftobjs.c file. This flaw allows an attacker to access a memory location in a way that could cause an application to halt or crash, leading to a denial of service

Platform:
Amazon Linux 2023
Product:
freetype
Reference:
ALAS2023-2023-074
CVE-2020-15999
CVE-2022-27404
CVE-2022-27405
CVE-2022-27406
CVE    4
CVE-2022-27404
CVE-2022-27405
CVE-2022-27406
CVE-2020-15999
...
CPE    1
cpe:/a:freetype:freetype

© SecPod Technologies