Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 23 Jun 2008 18:09:14 -0700 (PDT)
From:      Nick Barkas <snb@threerings.net>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/124917: [patch] security/vuxml add vulnerabilities for freetype2 < 2.3.6
Message-ID:  <20080624010914.28A2961DF9@smtp.earth.threerings.net>
Resent-Message-ID: <200806240110.m5O1A23L019536@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         124917
>Category:       ports
>Synopsis:       [patch] security/vuxml add vulnerabilities for freetype2 < 2.3.6
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Tue Jun 24 01:10:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     Nick Barkas
>Release:        FreeBSD 6.3-RELEASE-p2 i386
>Organization:
Three Rings Design
>Environment:
System: FreeBSD mail1.earth.threerings.net 6.3-RELEASE-p2 FreeBSD 6.3-RELEASE-p2 #3: Sat May 31 19:44:03 PDT 2008 root@mail1.earth.threerings.net:/usr/obj/usr/src/sys/SMP i386
>Description:
FreeType below 2.3.6 has multiple vulnerabilities. This patch adds a VuXML entry
to document those.
>How-To-Repeat:
>Fix:
--- vuxml.patch begins here ---
--- vuln.xml.orig	2008-06-22 14:08:08.000000000 -0700
+++ vuln.xml	2008-06-23 18:02:59.000000000 -0700
@@ -34,6 +34,58 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="8ae3e5bb-4186-11dd-8a7c-00304835b4b2">
+    <topic>FreeType 2 -- Multiple Vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>freetype2</name>
+	<range><lt>2.3.6</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<blockquote cite="http://secunia.com/advisories/30600">;
+	  <ul>
+	    <li>An integer overflow error exists in the processing of PFB font
+	      files. This can be exploited to cause a heap-based buffer overflow
+	      via a PFB file containing a specially crafted "Private" dictionary
+	      table.</li>
+	    <li>An error in the processing of PFB font files can be exploited to
+	      trigger the "free()" of memory areas that are not allocated on the
+	      heap.</li>
+	    <li>An off-by-one error exists in the processing of PFB font files.
+	      This can be exploited to cause a one-byte heap-based buffer 
+	      overflow via a specially crafted PFB file.</li>
+	    <li>An off-by-one error exists in the implementation of the "SHC"
+	      instruction while processing TTF files. This can be exploited to 
+	      cause a one-byte heap-based buffer overflow via a specially 
+	      crafted TTF file.</li>
+	  </ul>
+	  <p>Successful exploitation of the vulnerabilities may allow execution
+	    of arbitrary code.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <bid>29637</bid>
+      <bid>29639</bid>
+      <bid>29640</bid>
+      <bid>29641</bid>
+      <cvename>CVE-2008-1806</cvename>
+      <cvename>CVE-2008-1807</cvename>
+      <cvename>CVE-2008-1808</cvename>
+      <url>http://secunia.com/advisories/30600</url>;
+      <url>http://sourceforge.net/project/shownotes.php?release_id=605780</url>;
+      <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715</url>;
+      <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716</url>;
+      <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717</url>;
+    </references>
+    <dates>
+      <discovery>2008-06-10</discovery>
+      <entry>2008-06-23</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="ee6fa2bd-406a-11dd-936a-0015af872849">
     <topic>php -- input validation error in posix_access function</topic>
     <affects>
--- vuxml.patch ends here ---


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080624010914.28A2961DF9>