Lucene search

K
gentooGentoo FoundationGLSA-201006-01
HistoryJun 01, 2010 - 12:00 a.m.

FreeType 1: User-assisted execution of arbitrary code

2010-06-0100:00:00
Gentoo Foundation
security.gentoo.org
32

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.621 Medium

EPSS

Percentile

97.8%

Background

FreeType is a True Type Font rendering library.

Description

Multiple issues found in FreeType 2 were also discovered in FreeType 1. For details on these issues, please review the Gentoo Linux Security Advisories and CVE identifiers referenced below.

Impact

A remote attacker could entice a user to open a specially crafted TTF file, possibly resulting in the execution of arbitrary code with the privileges of the user running FreeType.

Workaround

There is no known workaround at this time.

Resolution

All FreeType 1 users should upgrade to an unaffected version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/freetype-1.4_pre20080316-r2"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since May 27, 2009. It is likely that your system is already no longer affected by this issue.

OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/freetype< 1.4_pre20080316-r2UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.621 Medium

EPSS

Percentile

97.8%