Lucene search

K
gentooGentoo FoundationGLSA-200705-02
HistoryMay 01, 2007 - 12:00 a.m.

FreeType: User-assisted execution of arbitrary code

2007-05-0100:00:00
Gentoo Foundation
security.gentoo.org
16

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.05 Low

EPSS

Percentile

92.8%

Background

FreeType is a True Type Font rendering library.

Description

Greg MacManus of iDefense Labs has discovered an integer overflow in the function bdfReadCharacters() when parsing BDF fonts.

Impact

A remote attacker could entice a user to use a specially crafted BDF font, possibly resulting in a heap-based buffer overflow and the remote execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All FreeType users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.1.10-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/freetype< 2.1.10-r3UNKNOWN

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.05 Low

EPSS

Percentile

92.8%