Description: | Summary: The remote host is missing an update for the Debian 't1lib' package(s) announced via the DSA-2388-1 advisory.
Vulnerability Insight: Several vulnerabilities were discovered in t1lib, a Postscript Type 1 font rasterizer library, some of which might lead to code execution through the opening of files embedding bad fonts.
CVE-2010-2642
A heap-based buffer overflow in the AFM font metrics parser potentially leads to the execution of arbitrary code.
CVE-2011-0433
Another heap-based buffer overflow in the AFM font metrics parser potentially leads to the execution of arbitrary code.
CVE-2011-0764
An invalid pointer dereference allows execution of arbitrary code using crafted Type 1 fonts.
CVE-2011-1552
Another invalid pointer dereference results in an application crash, triggered by crafted Type 1 fonts.
CVE-2011-1553
A use-after-free vulnerability results in an application crash, triggered by crafted Type 1 fonts.
CVE-2011-1554
An off-by-one error results in an invalid memory read and application crash, triggered by crafted Type 1 fonts.
For the oldstable distribution (lenny), this problem has been fixed in version 5.1.2-3+lenny1.
For the stable distribution (squeeze), this problem has been fixed in version 5.1.2-3+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in version 5.1.2-3.4.
For the unstable distribution (sid), this problem has been fixed in version 5.1.2-3.4.
We recommend that you upgrade your t1lib packages.
Affected Software/OS: 't1lib' package(s) on Debian 5, Debian 6.
Solution: Please install the updated package(s).
CVSS Score: 7.6
CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
|