openSUSE Security Update : freetype2 (openSUSE-SU-2010:0549-1)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update of freetype2 fixes several vulnerabilities that could lead
to remote system compromise by executing arbitrary code with user
privileges :

- CVE-2010-1797: stack-based buffer overflow while
processing CFF opcodes

- CVE-2010-2497: integer underflow

- CVE-2010-2498: invalid free

- CVE-2010-2499: buffer overflow

- CVE-2010-2500: integer overflow

- CVE-2010-2519: heap buffer overflow

- CVE-2010-2520: heap buffer overflow

- CVE-2010-2527: buffer overflows in the freetype demo

- CVE-2010-2541: buffer overflow in ftmulti demo program

- CVE-2010-2805: improper bounds checking

- CVE-2010-2806: improper bounds checking

- CVE-2010-2807: improper type comparisons

- CVE-2010-2808: memory corruption flaw by processing
certain LWFN fonts

See also :

http://lists.opensuse.org/opensuse-updates/2010-08/msg00060.html
https://bugzilla.novell.com/show_bug.cgi?id=619562
https://bugzilla.novell.com/show_bug.cgi?id=628213
https://bugzilla.novell.com/show_bug.cgi?id=629447

Solution :

Update the affected freetype2 packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now