Scientific Linux Security Update : freetype on SL3.x, SL4.x, SL5.x i386/x86_64

High Nessus Plugin ID 60830


The remote Scientific Linux host is missing one or more security updates.


Two stack overflow flaws were found in the way the FreeType font engine processed certain Compact Font Format (CFF) character strings (opcodes). If a user loaded a specially crafted font file with an application linked against FreeType, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2010-1797)

Note: CVE-2010-1797 only affects the FreeType 2 font engine.

The X server must be restarted (log out, then log back in) for this update to take effect.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 60830

File Name: sl_20100805_freetype_on_SL3_x.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2012/08/01

Modified: 2014/08/16

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/08/05

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Reference Information

CVE: CVE-2010-1797