Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.70809
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 201201-08 (FontForge)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 201201-08.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 201201-08.

Vulnerability Insight:
A stack-based buffer overflow flaw in FontForge could result in
execution of arbitrary code or a Denial of Service.

Solution:
All FontForge users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=media-gfx/fontforge-20110222-r1'


NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since October 12, 2011. It is likely that your system is
already no longer affected by this issue.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-4259
15732
http://www.exploit-db.com/exploits/15732
42577
http://secunia.com/advisories/42577
45162
http://www.securityfocus.com/bid/45162
ADV-2010-3200
http://www.vupen.com/english/advisories/2010/3200
DSA-2253
http://www.debian.org/security/2011/dsa-2253
FEDORA-2010-18573
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html
FEDORA-2010-18577
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html
[oss-security] 20101202 CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header
http://openwall.com/lists/oss-security/2010/12/02/5
[oss-security] 20101202 Re: CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header
http://openwall.com/lists/oss-security/2010/12/02/8
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537
https://bugzilla.redhat.com/show_bug.cgi?id=659359
CopyrightCopyright (C) 2012 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.