openSUSE Security Update : graphite2 (openSUSE-2016-349)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for graphite2 fixes the following issues :

- CVE-2016-1521: The directrun function in
directmachine.cpp in Libgraphite did not validate a
certain skip operation, which allowed remote attackers
to execute arbitrary code, obtain sensitive information,
or cause a denial of service (out-of-bounds read and
application crash) via a crafted Graphite smart font.

- CVE-2016-1522: Code.cpp in Libgraphite did not consider
recursive load calls during a size check, which allowed
remote attackers to cause a denial of service
(heap-based buffer overflow) or possibly execute
arbitrary code via a crafted Graphite smart font.

- CVE-2016-1523: The SillMap::readFace function in
FeatureMap.cpp in Libgraphite mishandled a return value,
which allowed remote attackers to cause a denial of
service (missing initialization, NULL pointer
dereference, and application crash) via a crafted
Graphite smart font.

- CVE-2016-1526: The TtfUtil:LocaLookup function in
TtfUtil.cpp in Libgraphite incorrectly validated a size
value, which allowed remote attackers to obtain
sensitive information or cause a denial of service
(out-of-bounds read and application crash) via a crafted
Graphite smart font.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=965803
https://bugzilla.opensuse.org/show_bug.cgi?id=965806
https://bugzilla.opensuse.org/show_bug.cgi?id=965807
https://bugzilla.opensuse.org/show_bug.cgi?id=965810

Solution :

Update the affected graphite2 packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 89975 ()

Bugtraq ID:

CVE ID: CVE-2016-1521
CVE-2016-1522
CVE-2016-1523
CVE-2016-1526

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now