Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69960
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2253-1)
Summary:The remote host is missing an update for the Debian 'fontforge' package(s) announced via the DSA-2253-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'fontforge' package(s) announced via the DSA-2253-1 advisory.

Vulnerability Insight:
Ulrik Persson reported a stack-based buffer overflow flaw in FontForge, a font editor. When processed a crafted Bitmap Distribution Format (BDF) FontForge could crash or execute arbitrary code with the privileges of the user running FontForge.

For the oldstable distribution (lenny), this problem has been fixed in version 0.0.20080429-1+lenny2.

The stable distribution (squeeze), testing distribution (wheezy), and unstable distribution (sid) are not affected by this problem.

We recommend that you upgrade your fontforge packages.

Affected Software/OS:
'fontforge' package(s) on Debian 5.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4259
15732
http://www.exploit-db.com/exploits/15732
42577
http://secunia.com/advisories/42577
45162
http://www.securityfocus.com/bid/45162
ADV-2010-3200
http://www.vupen.com/english/advisories/2010/3200
DSA-2253
http://www.debian.org/security/2011/dsa-2253
FEDORA-2010-18573
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html
FEDORA-2010-18577
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html
[oss-security] 20101202 CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header
http://openwall.com/lists/oss-security/2010/12/02/5
[oss-security] 20101202 Re: CVE Request -- FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header
http://openwall.com/lists/oss-security/2010/12/02/8
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537
https://bugzilla.redhat.com/show_bug.cgi?id=659359
CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.