Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69191
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2010:0889
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2010:0889.

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide
both the FreeType 1 and FreeType 2 font engines. The freetype packages for
Red Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.

A heap-based buffer overflow flaw was found in the way the FreeType font
rendering engine processed certain TrueType GX fonts. If a user loaded a
specially-crafted font file with an application linked against FreeType, it
could cause the application to crash or, possibly, execute arbitrary code
with the privileges of the user running the application. (CVE-2010-3855)

Note: This issue only affects the FreeType 2 font engine.

Users are advised to upgrade to these updated packages, which contain a
backported patch to correct this issue. The X server must be restarted (log
out, then log back in) for this update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2010-0889.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3855
1024745
http://www.securitytracker.com/id?1024745
42289
http://secunia.com/advisories/42289
42295
http://secunia.com/advisories/42295
43138
http://secunia.com/advisories/43138
44214
http://www.securityfocus.com/bid/44214
48951
http://secunia.com/advisories/48951
ADV-2010-3037
http://www.vupen.com/english/advisories/2010/3037
ADV-2011-0246
http://www.vupen.com/english/advisories/2011/0246
APPLE-SA-2011-03-09-1
http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
APPLE-SA-2011-03-09-3
http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html
APPLE-SA-2011-03-21-1
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
APPLE-SA-2011-07-15-1
http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
APPLE-SA-2011-07-15-2
http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
DSA-2155
http://www.debian.org/security/2011/dsa-2155
FEDORA-2010-17728
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html
FEDORA-2010-17742
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html
FEDORA-2010-17755
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html
MDVSA-2010:235
http://www.mandriva.com/security/advisories?name=MDVSA-2010:235
MDVSA-2010:236
http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
RHSA-2010:0889
http://www.redhat.com/support/errata/RHSA-2010-0889.html
USN-1013-1
http://www.ubuntu.com/usn/USN-1013-1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a
http://support.apple.com/kb/HT4564
http://support.apple.com/kb/HT4565
http://support.apple.com/kb/HT4581
http://support.apple.com/kb/HT4802
http://support.apple.com/kb/HT4803
http://support.avaya.com/css/P8/documents/100122733
https://savannah.nongnu.org/bugs/?31310
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.