Rapid7 Vulnerability & Exploit Database

RHSA-2010:0737: freetype security update

Back to Search

RHSA-2010:0737: freetype security update

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
01/07/2011
Created
07/25/2018
Added
01/07/2011
Modified
07/04/2017

Description

FreeType is a free, high-quality, portable font engine that can open andmanage font files. It also loads, hints, and renders individual glyphsefficiently. The freetype packages for Red Hat Enterprise Linux 4 provideboth the FreeType 1 and FreeType 2 font engines. The freetype packages forRed Hat Enterprise Linux 5 provide only the FreeType 2 font engine.It was discovered that the FreeType font rendering engine improperlyvalidated certain position values when processing input streams. If a userloaded a specially-crafted font file with an application linked againstFreeType, and the relevant font glyphs were subsequently rendered with theX FreeType library (libXft), it could trigger a heap-based buffer overflowin the libXft library, causing the application to crash or, possibly,execute arbitrary code with the privileges of the user running theapplication. (CVE-2010-3311)A stack-based buffer overflow flaw was found in the way the FreeType fontrendering engine processed some PostScript Type 1 fonts. If a user loaded aspecially-crafted font file with an application linked against FreeType, itcould cause the application to crash or, possibly, execute arbitrary codewith the privileges of the user running the application. (CVE-2010-2808)An array index error was found in the way the FreeType font renderingengine processed certain PostScript Type 42 font files. If a user loaded aspecially-crafted font file with an application linked against FreeType, itcould cause the application to crash or, possibly, execute arbitrary codewith the privileges of the user running the application. (CVE-2010-2806)A stack overflow flaw was found in the way the FreeType font renderingengine processed PostScript Type 1 font files that contain nested StandardEncoding Accented Character (seac) calls. If a user loaded aspecially-crafted font file with an application linked against FreeType, itcould cause the application to crash. (CVE-2010-3054)Note: All of the issues in this erratum only affect the FreeType 2 fontengine.Users are advised to upgrade to these updated packages, which containbackported patches to correct these issues. The X server must be restarted(log out, then log back in) for this update to take effect.

Solution(s)

  • redhat-upgrade-freetype
  • redhat-upgrade-freetype-demos
  • redhat-upgrade-freetype-devel
  • redhat-upgrade-freetype-utils

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;