openSUSE Security Update : libfreetype6 (openSUSE-SU-2010:0549-1)

high Nessus Plugin ID 75578

Synopsis

The remote openSUSE host is missing a security update.

Description

This update of freetype2 fixes several vulnerabilities that could lead to remote system compromise by executing arbitrary code with user privileges :

- CVE-2010-1797: stack-based buffer overflow while processing CFF opcodes

- CVE-2010-2497: integer underflow

- CVE-2010-2498: invalid free

- CVE-2010-2499: buffer overflow

- CVE-2010-2500: integer overflow

- CVE-2010-2519: heap buffer overflow

- CVE-2010-2520: heap buffer overflow

- CVE-2010-2527: buffer overflows in the freetype demo

- CVE-2010-2541: buffer overflow in ftmulti demo program

- CVE-2010-2805: improper bounds checking

- CVE-2010-2806: improper bounds checking

- CVE-2010-2807: improper type comparisons

- CVE-2010-2808: memory corruption flaw by processing certain LWFN fonts

Solution

Update the affected libfreetype6 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=619562

https://bugzilla.novell.com/show_bug.cgi?id=628213

https://bugzilla.novell.com/show_bug.cgi?id=629447

https://lists.opensuse.org/opensuse-updates/2010-08/msg00060.html

Plugin Details

Severity: High

ID: 75578

File Name: suse_11_3_libfreetype6-100812.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:novell:opensuse:11.3, p-cpe:/a:novell:opensuse:libfreetype6-32bit, p-cpe:/a:novell:opensuse:libfreetype6

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/12/2010

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Reference Information

CVE: CVE-2010-1797, CVE-2010-2497, CVE-2010-2498, CVE-2010-2499, CVE-2010-2500, CVE-2010-2519, CVE-2010-2520, CVE-2010-2527, CVE-2010-2541, CVE-2010-2805, CVE-2010-2806, CVE-2010-2807, CVE-2010-2808