CVE-2012-5669

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.

References

http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d

http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html

http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html

http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html

http://rhn.redhat.com/errata/RHSA-2013-0216.html

http://secunia.com/advisories/51826

http://secunia.com/advisories/51900

http://www.freetype.org/

http://www.openwall.com/lists/oss-security/2012/12/25/2

http://www.securitytracker.com/id?1027921

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186

http://www.ubuntu.com/usn/USN-1686-1

https://savannah.nongnu.org/bugs/?37906

Details

Source: MITRE

Published: 2013-01-24

Updated: 2021-01-26

Type: CWE-119

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*

cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:* versions up to 2.4.10 (inclusive)

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
88531F5 Networks BIG-IP : BDF parsing vulnerability (K15095307)NessusF5 Networks Local Security Checks
medium
81967OracleVM 3.3 : freetype (OVMSA-2015-0036)NessusOracleVM Local Security Checks
high
80614Oracle Solaris Third-Party Patch Update : freetype (multiple_buffer_errors_vulnerabilities_in)NessusSolaris Local Security Checks
medium
75015openSUSE Security Update : freetype2 (openSUSE-SU-2013:0165-1)NessusSuSE Local Security Checks
medium
75003openSUSE Security Update : freetype2 (openSUSE-SU-2013:0177-1)NessusSuSE Local Security Checks
medium
72453GLSA-201402-16 : FreeType: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
69709Amazon Linux AMI : freetype (ALAS-2013-150)NessusAmazon Linux Local Security Checks
medium
68720Oracle Linux 5 / 6 : freetype (ELSA-2013-0216)NessusOracle Linux Local Security Checks
medium
66053Mandriva Linux Security Advisory : freetype2 (MDVSA-2013:039)NessusMandriva Local Security Checks
medium
64593Fedora 17 : freetype-2.4.8-4.fc17 (2013-1466)NessusFedora Local Security Checks
medium
64504Mandriva Linux Security Advisory : freetype2 (MDVSA-2013:006)NessusMandriva Local Security Checks
medium
64464Fedora 18 : freetype-2.4.10-3.fc18 (2013-1492)NessusFedora Local Security Checks
medium
64424Scientific Linux Security Update : freetype on SL5.x, SL6.x i386/x86_64 (20130131)NessusScientific Linux Local Security Checks
medium
64390RHEL 5 / 6 : freetype (RHSA-2013:0216)NessusRed Hat Local Security Checks
medium
64383CentOS 5 / 6 : freetype (CESA-2013:0216)NessusCentOS Local Security Checks
medium
64144SuSE 11.2 Security Update : freetype2 (SAT Patch Number 7232)NessusSuSE Local Security Checks
medium
63555Slackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 14.0 / current : freetype (SSA:2013-015-01)NessusSlackware Local Security Checks
medium
63536Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : freetype vulnerabilities (USN-1686-1)NessusUbuntu Local Security Checks
medium