Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.64022
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:1062
Resumen:The remote host is missing updates to FreeType announced in;advisory RHSA-2009:1062.;;Tavis Ormandy of the Google Security Team discovered several integer;overflow flaws in the FreeType 2 font engine. If a user loaded a;carefully-crafted font file with an application linked against FreeType 2,;it could cause the application to crash or, possibly, execute arbitrary;code with the privileges of the user running the application.;(CVE-2009-0946);;Chris Evans discovered multiple integer overflow flaws in the FreeType font;engine. If a user loaded a carefully-crafted font file with an application;linked against FreeType, it could cause the application to crash or,;possibly, execute arbitrary code with the privileges of the user running;the application. (CVE-2006-1861);;An integer overflow flaw was found in the way the FreeType font engine;processed TrueType Font (TTF) files. If a user loaded a carefully-crafted;font file with an application linked against FreeType, it could cause the;application to crash or, possibly, execute arbitrary code with the;privileges of the user running the application. (CVE-2007-2754);;Note: For the FreeType 2 font engine, the CVE-2006-1861 and CVE-2007-2754;flaws were addressed via RHSA-2006:0500 and RHSA-2007:0403 respectively.;This update provides corresponding updates for the FreeType 1 font engine,;included in the freetype packages distributed in Red Hat Enterprise Linux;2.1.;;Users are advised to upgrade to these updated packages, which contain;backported patches to correct these issues. The X server must be restarted;(log out, then log back in) for this update to take effect.
Descripción:Summary:
The remote host is missing updates to FreeType announced in
advisory RHSA-2009:1062.

Tavis Ormandy of the Google Security Team discovered several integer
overflow flaws in the FreeType 2 font engine. If a user loaded a
carefully-crafted font file with an application linked against FreeType 2,
it could cause the application to crash or, possibly, execute arbitrary
code with the privileges of the user running the application.
(CVE-2009-0946)

Chris Evans discovered multiple integer overflow flaws in the FreeType font
engine. If a user loaded a carefully-crafted font file with an application
linked against FreeType, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2006-1861)

An integer overflow flaw was found in the way the FreeType font engine
processed TrueType Font (TTF) files. If a user loaded a carefully-crafted
font file with an application linked against FreeType, it could cause the
application to crash or, possibly, execute arbitrary code with the
privileges of the user running the application. (CVE-2007-2754)

Note: For the FreeType 2 font engine, the CVE-2006-1861 and CVE-2007-2754
flaws were addressed via RHSA-2006:0500 and RHSA-2007:0403 respectively.
This update provides corresponding updates for the FreeType 1 font engine,
included in the freetype packages distributed in Red Hat Enterprise Linux
2.1.

Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-1861
1016522
http://securitytracker.com/id?1016522
102705
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
18034
http://www.securityfocus.com/bid/18034
20060612 rPSA-2006-0100-1 freetype
http://www.securityfocus.com/archive/1/436836/100/0/threaded
20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
20100
http://secunia.com/advisories/20100
20525
http://secunia.com/advisories/20525
20591
http://secunia.com/advisories/20591
20638
http://secunia.com/advisories/20638
20791
http://secunia.com/advisories/20791
21000
http://secunia.com/advisories/21000
21062
http://secunia.com/advisories/21062
21135
http://secunia.com/advisories/21135
21385
http://secunia.com/advisories/21385
21701
http://secunia.com/advisories/21701
23939
http://secunia.com/advisories/23939
27162
http://secunia.com/advisories/27162
27167
http://secunia.com/advisories/27167
27271
http://secunia.com/advisories/27271
33937
http://secunia.com/advisories/33937
35200
http://secunia.com/advisories/35200
35204
http://secunia.com/advisories/35204
35233
http://secunia.com/advisories/35233
ADV-2006-1868
http://www.vupen.com/english/advisories/2006/1868
ADV-2007-0381
http://www.vupen.com/english/advisories/2007/0381
APPLE-SA-2009-02-12
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
DSA-1095
http://www.debian.org/security/2006/dsa-1095
FEDORA-2009-5558
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
FEDORA-2009-5644
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
GLSA-200607-02
http://security.gentoo.org/glsa/glsa-200607-02.xml
GLSA-200710-09
http://www.gentoo.org/security/en/glsa/glsa-200710-09.xml
MDKSA-2006:099
http://www.mandriva.com/security/advisories?name=MDKSA-2006:099
RHSA-2006:0500
http://www.redhat.com/support/errata/RHSA-2006-0500.html
RHSA-2009:0329
http://www.redhat.com/support/errata/RHSA-2009-0329.html
RHSA-2009:1062
http://www.redhat.com/support/errata/RHSA-2009-1062.html
SUSE-SA:2006:037
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
SUSE-SR:2007:021
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
USN-291-1
https://usn.ubuntu.com/291-1/
freetype-lwfn-overflow(26553)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26553
http://sourceforge.net/project/shownotes.php?release_id=416463
http://support.apple.com/kb/HT3438
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8
https://bugzilla.redhat.com/show_bug.cgi?id=502565
https://issues.rpath.com/browse/RPL-429
oval:org.mitre.oval:def:9124
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124
Common Vulnerability Exposure (CVE) ID: CVE-2007-2754
1018088
http://www.securitytracker.com/id?1018088
102967
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
103171
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
200033
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
2007-0019
http://www.trustix.org/errata/2007/0019/
20070524 FLEA-2007-0020-1: freetype
http://www.securityfocus.com/archive/1/469463/100/200/threaded
20070602-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
20070613 FLEA-2007-0025-1: openoffice.org
http://www.securityfocus.com/archive/1/471286/30/6180/threaded
24074
http://www.securityfocus.com/bid/24074
25350
http://secunia.com/advisories/25350
25353
http://secunia.com/advisories/25353
25386
http://secunia.com/advisories/25386
25463
http://secunia.com/advisories/25463
25483
http://secunia.com/advisories/25483
25609
http://secunia.com/advisories/25609
25612
http://secunia.com/advisories/25612
25654
http://secunia.com/advisories/25654
25705
http://secunia.com/advisories/25705
25808
http://secunia.com/advisories/25808
25894
http://secunia.com/advisories/25894
25905
http://secunia.com/advisories/25905
26129
http://secunia.com/advisories/26129
26305
http://secunia.com/advisories/26305
28298
http://secunia.com/advisories/28298
30161
http://secunia.com/advisories/30161
35074
http://secunia.com/advisories/35074
36509
http://osvdb.org/36509
ADV-2007-1894
http://www.vupen.com/english/advisories/2007/1894
ADV-2007-2229
http://www.vupen.com/english/advisories/2007/2229
ADV-2008-0049
http://www.vupen.com/english/advisories/2008/0049
ADV-2009-1297
http://www.vupen.com/english/advisories/2009/1297
APPLE-SA-2007-11-14
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
APPLE-SA-2009-05-12
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
DSA-1302
http://www.debian.org/security/2007/dsa-1302
DSA-1334
http://www.debian.org/security/2007/dsa-1334
GLSA-200705-22
http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
GLSA-200707-02
http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
GLSA-200805-07
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
MDKSA-2007:121
http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
OpenPKG-SA-2007.018
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
RHSA-2007:0403
http://www.redhat.com/support/errata/RHSA-2007-0403.html
SUSE-SA:2007:041
http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
USN-466-1
http://www.ubuntu.com/usn/usn-466-1
[ft-devel] 20070427 Bug in fuzzed TTF file
http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
http://support.apple.com/kb/HT3549
http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
https://issues.rpath.com/browse/RPL-1390
oval:org.mitre.oval:def:11325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
oval:org.mitre.oval:def:5532
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
Common Vulnerability Exposure (CVE) ID: CVE-2009-0946
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
BugTraq ID: 34550
http://www.securityfocus.com/bid/34550
Cert/CC Advisory: TA09-133A
Debian Security Information: DSA-1784 (Google Search)
http://www.debian.org/security/2009/dsa-1784
http://security.gentoo.org/glsa/glsa-200905-05.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:243
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149
http://www.redhat.com/support/errata/RHSA-2009-1061.html
http://secunia.com/advisories/34723
http://secunia.com/advisories/34913
http://secunia.com/advisories/34967
http://secunia.com/advisories/35065
http://secunia.com/advisories/35198
http://secunia.com/advisories/35210
http://secunia.com/advisories/35379
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1
SuSE Security Announcement: SUSE-SR:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://www.ubuntu.com/usn/USN-767-1
http://www.vupen.com/english/advisories/2009/1058
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.