vendor:
FreeType
by:
Google Security Research
7.5
CVSS
HIGH
Heap-based out-of-bounds memory read
CWE
Product Name: FreeType
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:freetype_project:freetype
Platforms Tested:
Heap-based out-of-bounds memory read in FreeType
The exploit triggers a heap-buffer-overflow in FreeType, specifically in the tt_sbit_decoder_load_bit_aligned function in ttsbit.c file. It has been reproduced with the current version of freetype2 from the master git branch, with a 64-bit build of the ftbench utility compiled with AddressSanitizer.
Mitigation:
Update to the latest version of FreeType