RHEL 2.1 : freetype (RHSA-2008:0558)

This script is Copyright (C) 2008-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated freetype packages that fix various security issues are now
available for Red Hat Enterprise Linux 2.1.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

[Updated 25th June 2008] The original packages distributed with this
errata had a bug which prevented freetype library from loading certain
font files correctly. We have updated the packages to correct this

FreeType is a free, high-quality, portable font engine that can open
and manage font files, as well as efficiently load, hint and render
individual glyphs.

Multiple flaws were discovered in FreeType's Printer Font Binary (PFB)
and TrueType Font (TTF) font-file format parsers. If a user loaded a
carefully crafted font-file with a program linked against FreeType, it
could cause the application to crash, or possibly execute arbitrary
code. (CVE-2008-1806, CVE-2008-1807, CVE-2008-1808)

Note: the flaw in FreeType's TrueType Font (TTF) font-file format
parser, covered by CVE-2008-1808, only affected the FreeType 1 library
(libttf), which shipped in the freetype packages in Red Hat Enterprise
Linux 2.1. The FreeType 2 library (libfreetype) is not affected, as it
is not compiled with TTF Byte Code Interpreter (BCI) support.

Users of freetype should upgrade to these updated packages, which
contain backported patches to resolve these issues.

See also :


Solution :

Update the affected freetype, freetype-devel and / or freetype-utils

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 33250 ()

Bugtraq ID: 29637

CVE ID: CVE-2008-1806

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now