Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-27363

Опубликовано: 11 мар. 2025
Источник: redhat
CVSS3: 8.1
EPSS Высокий

Описание

An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.

Отчет

This vulnerability stems from improper handling of data types within the FreeType library during the parsing of font subglyph structures. This could causes incorrect calculations that result in heap buffer allocation being too small. This could allow the library write data beyond the allocated buffer, affecting adjacent memory areas, leading into arbitrary code executions compromising the entire system and system stability such as misleading behaviors in applications which relies on FreeType, or causing possible crashes impacting the entire system.

Меры по смягчению последствий

By restricting the sources from which font files can be loaded allowing only fonts from trusted sources, as well as validating the input for font files to avoid malformed font structures or any data which could trigger the vulnerability would reduce the risk and mitigate this vulnerability until the fix is provided.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of OpenJDK 11java-11-openjdkNot affected
Red Hat build of OpenJDK 17java-17-openjdkNot affected
Red Hat build of OpenJDK 21java-21-openjdk-rhel7Not affected
Red Hat Enterprise Linux 10freetypeNot affected
Red Hat Enterprise Linux 10gjsNot affected
Red Hat Enterprise Linux 10java-21-openjdkNot affected
Red Hat Enterprise Linux 6freetypeOut of support scope
Red Hat Enterprise Linux 7thunderbirdNot affected
Red Hat Enterprise Linux 8java-17-openjdkNot affected
Red Hat Enterprise Linux 8java-21-openjdkNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2351357freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files

EPSS

Процентиль: 99%
0.73011
Высокий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
3 месяца назад

An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

CVSS3: 8.1
nvd
3 месяца назад

An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

CVSS3: 8.1
msrc
3 месяца назад

Описание отсутствует

CVSS3: 8.1
debian
3 месяца назад

An out of bounds write exists in FreeType versions 2.13.0 and below (n ...

suse-cvrf
3 месяца назад

Security update for freetype2

EPSS

Процентиль: 99%
0.73011
Высокий

8.1 High

CVSS3