Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : freetype vulnerabilities (USN-1013-1)

Ubuntu Security Notice (C) 2010-2013 Canonical, Inc. / NASL script (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Marc Schoenefeld discovered that FreeType did not correctly handle
certain malformed font files. If a user were tricked into using a
specially crafted font file, a remote attacker could cause FreeType to
crash or possibly execute arbitrary code with user privileges. This
issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.
(CVE-2010-3311)

Chris Evans discovered that FreeType did not correctly handle certain
malformed TrueType font files. If a user were tricked into using a
specially crafted TrueType file, a remote attacker could cause
FreeType to crash or possibly execute arbitrary code with user
privileges. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS
and 10.10. (CVE-2010-3814)

It was discovered that FreeType did not correctly handle certain
malformed TrueType font files. If a user were tricked into using a
specially crafted TrueType file, a remote attacker could cause
FreeType to crash or possibly execute arbitrary code with user
privileges. (CVE-2010-3855).

Solution :

Update the affected freetype2-demos, libfreetype6 and / or
libfreetype6-dev packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 50491 ()

Bugtraq ID: 43700
44214

CVE ID: CVE-2010-3311
CVE-2010-3814
CVE-2010-3855