full-disclosure-uk May 2007 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: [Full-disclosure] [OpenPKG-SA-2007.018] Open

[Full-disclosure] [OpenPKG-SA-2007.018] OpenPKG Security Advisory (freetype)

From: OpenPKG GmbH <openpkg-noreply_at_nospam>
Date: Thu May 24 2007 - 08:32:52 GMT
To: full-disclosure@lists.grok.org.uk

Hash: SHA1

Publisher Name: OpenPKG GmbH Publisher Home: http://openpkg.com/ Advisory Id (public): OpenPKG-SA-2007.018 Advisory Type: OpenPKG Security Advisory (SA) Advisory Directory: http://openpkg.com/go/OpenPKG-SA Advisory Document: http://openpkg.com/go/OpenPKG-SA-2007.018 Advisory Published: 2007-05-24 10:32 UTC Issue Id (internal): OpenPKG-SI-20070524.01 Issue First Created: 2007-05-24 Issue Last Modified: 2007-05-24 Issue Revision: 04
Subject Name: freetype Subject Summary: TrueType Font (TTF) Rendering Library Subject Home: http://freetype.sourceforge.net/ Subject Versions: * >= 2.3.4 Vulnerability Id: CVE-2007-2754 Vulnerability Scope: global (not OpenPKG specific) Attack Feasibility: run-time Attack Vector: remote network Attack Impact: arbitrary code execution


    A vulnerability caused by an integer signedness error was found     [0] by Victor Stinner in the font rendering library Freetype [1],     versions up to and including 2.3.4. The vulnerability might allow     remote attackers to execute arbitrary code via a specially crafted     TrueType Font (TTF) file with a negative "n_points" value, which     leads to an integer overflow and heap-based buffer overflow [2].     

    Advisory-References: [0] http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html [1] http://freetype.sourceforge.net/ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754


Primary Package Name: freetype
Primary Package Home: http://openpkg.org/go/package/freetype

Corrected Distribution: Corrected Branch: Corrected Package: OpenPKG Enterprise E1.0-SOLID freetype-2.2.1-E1.0.1 OpenPKG Community CURRENT freetype-2.3.4-20070524

For security reasons, this document was digitally signed with the OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34) which you can download from http://openpkg.com/openpkg.com.pgp or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/. Follow the instructions at http://openpkg.com/security/signatures/ for more details on how to verify the integrity of this document.

Comment: OpenPKG GmbH <http://openpkg.com/>

iD8DBQFGVU2sZwQuyWG3rjQRAhl4AKDAxlf6Lgl4ETSnF88H8+WLSj7pIQCeNp/5 UwNC7YG01KEsrk4aVQsASkk=

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/