Lucene search

K
amazonAmazonALAS-2011-008
HistoryOct 31, 2011 - 6:18 p.m.

Important: freetype

2011-10-3118:18:00
alas.aws.amazon.com
27

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.2

Confidence

High

EPSS

0.028

Percentile

90.6%

Issue Overview:

Multiple input validation flaws were found in the way FreeType processed bitmap font files. If a specially-crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

Affected Packages:

freetype

Issue Correction:
Run yum update freetype to update your system.

New Packages:

i686:  
    freetype-devel-2.3.11-6.10.amzn1.i686  
    freetype-2.3.11-6.10.amzn1.i686  
    freetype-demos-2.3.11-6.10.amzn1.i686  
    freetype-debuginfo-2.3.11-6.10.amzn1.i686  
  
src:  
    freetype-2.3.11-6.10.amzn1.src  
  
x86_64:  
    freetype-2.3.11-6.10.amzn1.x86_64  
    freetype-debuginfo-2.3.11-6.10.amzn1.x86_64  
    freetype-demos-2.3.11-6.10.amzn1.x86_64  
    freetype-devel-2.3.11-6.10.amzn1.x86_64  

Additional References

Red Hat: CVE-2011-3256

Mitre: CVE-2011-3256

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.2

Confidence

High

EPSS

0.028

Percentile

90.6%