Executive Summary
Summary | |
---|---|
Title | freetype security update |
Informations | |||
---|---|---|---|
Name | RHSA-2007:0403 | First vendor Publication | 2007-06-11 |
Vendor | RedHat | Last vendor Modification | 2007-06-11 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated freetype packages that fix a security flaw are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: FreeType is a free, high-quality, portable font engine. An integer overflow flaw was found in the way the FreeType font engine processed TTF font files. If a user loaded a carefully crafted font file with a program linked against FreeType, it could cause the application to crash or execute arbitrary code. While it is uncommon for a user to explicitly load a font file, there are several application file formats which contain embedded fonts that are parsed by FreeType. (CVE-2007-2754) Users of FreeType should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 240200 - CVE-2007-2754 freetype integer overflow |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2007-0403.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11325 | |||
Oval ID: | oval:org.mitre.oval:def:11325 | ||
Title: | Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow. | ||
Description: | Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-2754 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18574 | |||
Oval ID: | oval:org.mitre.oval:def:18574 | ||
Title: | DSA-1302-1 freetype - integer overflow | ||
Description: | A problem was discovered in freetype, a FreeType2 font engine, which could allow the execution of arbitrary code via an integer overflow in specially crafted TTF files. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1302-1 CVE-2007-2754 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | freetype |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21823 | |||
Oval ID: | oval:org.mitre.oval:def:21823 | ||
Title: | ELSA-2007:0403: freetype security update (Moderate) | ||
Description: | Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0403-02 CVE-2007-2754 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | freetype |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:5532 | |||
Oval ID: | oval:org.mitre.oval:def:5532 | ||
Title: | Security Vulnerability in FreeType 2 Font Engine May Allow Privilege Escalation Due to Heap Overflow | ||
Description: | Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-2754 | Version: | 1 |
Platform(s): | Sun Solaris 8 Sun Solaris 9 Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-09 | Name : CentOS Update for freetype CESA-2009:0329 centos3 i386 File : nvt/gb_CESA-2009_0329_freetype_centos3_i386.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201006-01 (freetype) File : nvt/glsa_201006_01.nasl |
2010-05-12 | Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002 File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl |
2009-10-13 | Name : SLES10: Security update for freetype2 File : nvt/sles10_freetype21.nasl |
2009-10-10 | Name : SLES9: Security update for freetype2 File : nvt/sles9p5016218.nasl |
2009-06-05 | Name : Fedora Core 10 FEDORA-2009-5558 (freetype1) File : nvt/fcore_2009_5558.nasl |
2009-06-05 | Name : Fedora Core 11 FEDORA-2009-5644 (freetype1) File : nvt/fcore_2009_5644.nasl |
2009-05-25 | Name : RedHat Security Advisory RHSA-2009:1062 File : nvt/RHSA_2009_1062.nasl |
2009-05-25 | Name : CentOS Security Advisory CESA-2009:0329 (freetype) File : nvt/ovcesa2009_0329.nasl |
2009-05-25 | Name : RedHat Security Advisory RHSA-2009:0329 File : nvt/RHSA_2009_0329.nasl |
2009-04-09 | Name : Mandriva Update for freetype2 MDKSA-2007:121 (freetype2) File : nvt/gb_mandriva_MDKSA_2007_121.nasl |
2009-03-23 | Name : Ubuntu Update for freetype vulnerability USN-466-1 File : nvt/gb_ubuntu_USN_466_1.nasl |
2009-02-27 | Name : Fedora Update for freetype FEDORA-2007-0033 File : nvt/gb_fedora_2007_0033_freetype_fc7.nasl |
2009-01-28 | Name : SuSE Update for freetype2 SUSE-SA:2007:041 File : nvt/gb_suse_2007_041.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200705-22 (freetype) File : nvt/glsa_200705_22.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200707-02 (openoffice) File : nvt/glsa_200707_02.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200805-07 (ltsp) File : nvt/glsa_200805_07.nasl |
2008-09-04 | Name : FreeBSD Ports: freetype2 File : nvt/freebsd_freetype20.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1334-1 (freetype) File : nvt/deb_1334_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
36509 | FreeType truetype/ttgload.c TTF Image Handling Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0329.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0403.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090522_freetype_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20070611_freetype_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2010-06-02 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201006-01.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11554.nasl - Type : ACT_GATHER_INFO |
2009-05-28 | Name : The remote Fedora host is missing a security update. File : fedora_2009-5558.nasl - Type : ACT_GATHER_INFO |
2009-05-28 | Name : The remote Fedora host is missing a security update. File : fedora_2009-5644.nasl - Type : ACT_GATHER_INFO |
2009-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0329.nasl - Type : ACT_GATHER_INFO |
2009-05-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-1062.nasl - Type : ACT_GATHER_INFO |
2009-05-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0329.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2009-002.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_freetype2-3746.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-466-1.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-0033.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_freetype2-3744.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_freetype2-3701.nasl - Type : ACT_GATHER_INFO |
2007-07-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1334.nasl - Type : ACT_GATHER_INFO |
2007-07-03 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200707-02.nasl - Type : ACT_GATHER_INFO |
2007-06-14 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-121.nasl - Type : ACT_GATHER_INFO |
2007-06-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0403.nasl - Type : ACT_GATHER_INFO |
2007-06-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1302.nasl - Type : ACT_GATHER_INFO |
2007-06-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0403.nasl - Type : ACT_GATHER_INFO |
2007-06-01 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200705-22.nasl - Type : ACT_GATHER_INFO |
2007-05-25 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_de2fab2d0a3711dcaae200304881ac9a.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing Sun Security Patch number 119812-22 File : solaris10_119812.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing Sun Security Patch number 119813-24 File : solaris10_x86_119813.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing Sun Security Patch number 124420-04 File : solaris8_124420.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing Sun Security Patch number 124421-04 File : solaris8_x86_124421.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:50:43 |
|