CVE-2016-10244

HIGH

Freetype < 2.7.1 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file.

References (9)

Core 9
Core References
Release Notes, Third Party Advisory x_refsource_confirm
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog?h=VER-2-7
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1038090
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201706-14
Third Party Advisory x_refsource_confirm
https://source.android.com/security/bulletin/2017-04-01
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/97405
Exploit, Patch, Third Party Advisory x_refsource_confirm
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2017/dsa-3839
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1038201

Scores

CVSS v3 7.8
EPSS 0.0051
EPSS Percentile 66.7%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-125
Status published
Products (2)
debian/debian_linux 8.0
freetype/freetype < 2.7.1
Published Mar 06, 2017
Tracked Since Feb 18, 2026