![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2017.0124 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2017-0124) |
Resumen: | The remote host is missing an update for the 'freetype2' package(s) announced via the MGASA-2017-0124 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'freetype2' package(s) announced via the MGASA-2017-0124 advisory. Vulnerability Insight: It was discovered that a heap-based buffer overflow existed in the FreeType library. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2016-10328). FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c (CVE-2017-8105). FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c (CVE-2017-8287). Affected Software/OS: 'freetype2' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-10328 BugTraq ID: 97677 http://www.securityfocus.com/bid/97677 https://security.gentoo.org/glsa/201706-14 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 http://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289 https://www.oracle.com/security-alerts/cpuapr2020.html Common Vulnerability Exposure (CVE) ID: CVE-2017-8105 BugTraq ID: 99093 http://www.securityfocus.com/bid/99093 Debian Security Information: DSA-3839 (Google Search) http://www.debian.org/security/2017/dsa-3839 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Common Vulnerability Exposure (CVE) ID: CVE-2017-8287 BugTraq ID: 99091 http://www.securityfocus.com/bid/99091 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |