Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.880568
Categoría:CentOS Local Security Checks
Título:CentOS Update for freetype CESA-2010:0889 centos5 i386
Resumen:The remote host is missing an update for the 'freetype'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'freetype'
package(s) announced via the referenced advisory.

Vulnerability Insight:
FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide
both the FreeType 1 and FreeType 2 font engines. The freetype packages for
Red Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.

A heap-based buffer overflow flaw was found in the way the FreeType font
rendering engine processed certain TrueType GX fonts. If a user loaded a
specially-crafted font file with an application linked against FreeType, it
could cause the application to crash or, possibly, execute arbitrary code
with the privileges of the user running the application. (CVE-2010-3855)

Note: This issue only affects the FreeType 2 font engine.

Users are advised to upgrade to these updated packages, which contain a
backported patch to correct this issue. The X server must be restarted (log
out, then log back in) for this update to take effect.

Affected Software/OS:
freetype on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-3855
1024745
http://www.securitytracker.com/id?1024745
42289
http://secunia.com/advisories/42289
42295
http://secunia.com/advisories/42295
43138
http://secunia.com/advisories/43138
44214
http://www.securityfocus.com/bid/44214
48951
http://secunia.com/advisories/48951
ADV-2010-3037
http://www.vupen.com/english/advisories/2010/3037
ADV-2011-0246
http://www.vupen.com/english/advisories/2011/0246
APPLE-SA-2011-03-09-1
http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
APPLE-SA-2011-03-09-3
http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html
APPLE-SA-2011-03-21-1
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
APPLE-SA-2011-07-15-1
http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
APPLE-SA-2011-07-15-2
http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
DSA-2155
http://www.debian.org/security/2011/dsa-2155
FEDORA-2010-17728
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html
FEDORA-2010-17742
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html
FEDORA-2010-17755
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html
MDVSA-2010:235
http://www.mandriva.com/security/advisories?name=MDVSA-2010:235
MDVSA-2010:236
http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
RHSA-2010:0889
http://www.redhat.com/support/errata/RHSA-2010-0889.html
USN-1013-1
http://www.ubuntu.com/usn/USN-1013-1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a
http://support.apple.com/kb/HT4564
http://support.apple.com/kb/HT4565
http://support.apple.com/kb/HT4581
http://support.apple.com/kb/HT4802
http://support.apple.com/kb/HT4803
http://support.avaya.com/css/P8/documents/100122733
https://savannah.nongnu.org/bugs/?31310
CopyrightCopyright (C) 2011 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.