Executive Summary

Summary
Title FreeType vulnerabilities
Informations
NameUSN-4126-2First vendor Publication2019-09-09
VendorUbuntuLast vendor Modification2019-09-09
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM - Ubuntu 12.04 ESM

Summary:

FreeType could be made to expose sensitive information if it opened a specially crafted font file.

Software Description: - freetype: FreeType 2 is a font engine library

Details:

USN-4126-1 fixed a vulnerability in FreeType. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

It was discovered that FreeType incorrectly handled certain font files. An attacker could possibly use this issue to access sensitive information. (CVE-2015-9381, CVE-2015-9382)

Original advisory details:

It was discovered that FreeType incorrectly handled certain font files.
An attacker could possibly use this issue to access sensitive information.
(CVE-2015-9383)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM:
libfreetype6 2.5.2-1ubuntu2.8+esm1

Ubuntu 12.04 ESM:
libfreetype6 2.4.8-1ubuntu2.7

After a standard system update you need to restart your session to make all the necessary changes.

References:
https://usn.ubuntu.com/4126-2
https://usn.ubuntu.com/4126-1
CVE-2015-9381, CVE-2015-9382, CVE-2015-9383

Original Source

Url : http://www.ubuntu.com/usn/USN-4126-2

CWE : Common Weakness Enumeration

%idName
100 %CWE-125Out-of-bounds Read

CPE : Common Platform Enumeration

TypeDescriptionCount
Application55
Os1

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2019-09-10 00:18:55
  • First insertion