Executive Summary

Summary
Title FreeType vulnerability
Informations
NameUSN-4126-1First vendor Publication2019-09-09
VendorUbuntuLast vendor Modification2019-09-09
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

FreeType could be made to expose sensitive information if if it opened a specially crafted font file.

Software Description: - freetype: FreeType 2 is a font engine library

Details:

It was discovered that FreeType incorrectly handled certain font files. An attacker could possibly use this issue to access sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS:
libfreetype6 2.6.1-0.1ubuntu2.4

After a standard system update you need to restart your session to make all the necessary changes.

References:
https://usn.ubuntu.com/4126-1
CVE-2015-9383

Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.6.1-0.1ubuntu2.4

Original Source

Url : http://www.ubuntu.com/usn/USN-4126-1

CWE : Common Weakness Enumeration

%idName
100 %CWE-125Out-of-bounds Read

CPE : Common Platform Enumeration

TypeDescriptionCount
Application55
Os1

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-09-10 09:22:04
  • Multiple Updates
2019-09-09 21:19:08
  • First insertion