[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2010:157 -- Mandriva freetype2

ID: oval:org.secpod.oval:def:300010Date: (C)2012-01-07   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in freetype2: The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted font file . Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow . FreeType before 2.4.2 uses incorrect integer data types during bounds checking, which allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted font file . Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File font . bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service via a crafted BDF font file, related to an attempted modification of a value in a static string . The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2010.0
Mandriva Linux 2010.1
Product:
freetype2
Reference:
MDVSA-2010:157
CVE-2010-3053
CVE-2010-2807
CVE-2010-2806
CVE-2010-2805
CVE    4
CVE-2010-2807
CVE-2010-2806
CVE-2010-2805
CVE-2010-3053
...
CPE    2
cpe:/o:mandriva:linux:2010.1
cpe:/o:mandriva:linux:2010.0

© SecPod Technologies