Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.1.2007.1302
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1302-1)
Summary:The remote host is missing an update for the Debian 'freetype' package(s) announced via the DSA-1302-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'freetype' package(s) announced via the DSA-1302-1 advisory.

Vulnerability Insight:
A problem was discovered in freetype, a FreeType2 font engine, which could allow the execution of arbitrary code via an integer overflow in specially crafted TTF files.

For the stable distribution (etch), this problem has been fixed in version 2.2.1-5+etch1.

For the unstable distribution (sid), this problem has been fixed in version 2.2.1-6.

We recommend that you upgrade your freetype package.

Affected Software/OS:
'freetype' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2754
1018088
http://www.securitytracker.com/id?1018088
102967
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
103171
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
200033
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
2007-0019
http://www.trustix.org/errata/2007/0019/
20070524 FLEA-2007-0020-1: freetype
http://www.securityfocus.com/archive/1/469463/100/200/threaded
20070602-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
20070613 FLEA-2007-0025-1: openoffice.org
http://www.securityfocus.com/archive/1/471286/30/6180/threaded
24074
http://www.securityfocus.com/bid/24074
25350
http://secunia.com/advisories/25350
25353
http://secunia.com/advisories/25353
25386
http://secunia.com/advisories/25386
25463
http://secunia.com/advisories/25463
25483
http://secunia.com/advisories/25483
25609
http://secunia.com/advisories/25609
25612
http://secunia.com/advisories/25612
25654
http://secunia.com/advisories/25654
25705
http://secunia.com/advisories/25705
25808
http://secunia.com/advisories/25808
25894
http://secunia.com/advisories/25894
25905
http://secunia.com/advisories/25905
26129
http://secunia.com/advisories/26129
26305
http://secunia.com/advisories/26305
28298
http://secunia.com/advisories/28298
30161
http://secunia.com/advisories/30161
35074
http://secunia.com/advisories/35074
35200
http://secunia.com/advisories/35200
35204
http://secunia.com/advisories/35204
35233
http://secunia.com/advisories/35233
36509
http://osvdb.org/36509
ADV-2007-1894
http://www.vupen.com/english/advisories/2007/1894
ADV-2007-2229
http://www.vupen.com/english/advisories/2007/2229
ADV-2008-0049
http://www.vupen.com/english/advisories/2008/0049
ADV-2009-1297
http://www.vupen.com/english/advisories/2009/1297
APPLE-SA-2007-11-14
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
APPLE-SA-2009-05-12
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
DSA-1302
http://www.debian.org/security/2007/dsa-1302
DSA-1334
http://www.debian.org/security/2007/dsa-1334
FEDORA-2009-5558
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
FEDORA-2009-5644
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
GLSA-200705-22
http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
GLSA-200707-02
http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
GLSA-200805-07
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
MDKSA-2007:121
http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
OpenPKG-SA-2007.018
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
RHSA-2007:0403
http://www.redhat.com/support/errata/RHSA-2007-0403.html
RHSA-2009:0329
http://www.redhat.com/support/errata/RHSA-2009-0329.html
RHSA-2009:1062
http://www.redhat.com/support/errata/RHSA-2009-1062.html
SUSE-SA:2007:041
http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
USN-466-1
http://www.ubuntu.com/usn/usn-466-1
[ft-devel] 20070427 Bug in fuzzed TTF file
http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
http://support.apple.com/kb/HT3549
http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
https://bugzilla.redhat.com/show_bug.cgi?id=502565
https://issues.rpath.com/browse/RPL-1390
oval:org.mitre.oval:def:11325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
oval:org.mitre.oval:def:5532
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.