CentOS 3 / 4 / 5 : freetype (CESA-2008:0556)

High Nessus Plugin ID 33229

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated freetype packages that fix various security issues are now available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

[Updated 25th June 2008] The original packages for Red Hat Enterprise Linux 3 and 4 distributed with this errata had a bug which prevented freetype library from loading certain font files correctly. We have updated the packages to correct this bug.

FreeType is a free, high-quality, portable font engine that can open and manage font files, as well as efficiently load, hint and render individual glyphs.

Multiple flaws were discovered in FreeType's Printer Font Binary (PFB) font-file format parser. If a user loaded a carefully crafted font-file with a program linked against FreeType, it could cause the application to crash, or possibly execute arbitrary code.
(CVE-2008-1806, CVE-2008-1807, CVE-2008-1808)

Note: the flaw in FreeType's TrueType Font (TTF) font-file format parser, covered by CVE-2008-1808, did not affect the freetype packages as shipped in Red Hat Enterprise Linux 3, 4, and 5, as they are not compiled with TTF Byte Code Interpreter (BCI) support.

Users of freetype should upgrade to these updated packages, which contain backported patches to resolve these issues.

Solution

Update the affected freetype packages.

See Also

http://www.nessus.org/u?53005098

http://www.nessus.org/u?ab870e3f

http://www.nessus.org/u?d8b7d6f8

http://www.nessus.org/u?ad2394fc

http://www.nessus.org/u?c091bea5

http://www.nessus.org/u?974e3d4f

http://www.nessus.org/u?38cf3dcd

http://www.nessus.org/u?1e40e752

Plugin Details

Severity: High

ID: 33229

File Name: centos_RHSA-2008-0556.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2008/06/24

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:freetype, p-cpe:/a:centos:centos:freetype-demos, p-cpe:/a:centos:centos:freetype-devel, p-cpe:/a:centos:centos:freetype-utils, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2008/06/28

Vulnerability Publication Date: 2008/06/16

Reference Information

CVE: CVE-2008-1806, CVE-2008-1807, CVE-2008-1808

BID: 29637, 29639, 29640, 29641

RHSA: 2008:0556

CWE: 189