exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 20591

Secunia Security Advisory 20591
Posted Jun 12, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 8590f818d83df943053a5c8c79958c7f1b46bb74f380aa0f7386d9925f1ced53

Secunia Security Advisory 20591

Change Mirror Download


----------------------------------------------------------------------

Want to join the Secunia Security Team?

Secunia offers a position as a security specialist, where your daily
work involves reverse engineering of software and exploit code,
auditing of source code, and analysis of vulnerability reports.

http://secunia.com/secunia_security_specialist/

----------------------------------------------------------------------

TITLE:
Debian update for freetype

SECUNIA ADVISORY ID:
SA20591

VERIFY ADVISORY:
http://secunia.com/advisories/20591/

CRITICAL:
Moderately critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux 3.0
http://secunia.com/product/143/

DESCRIPTION:
Debian has issued an update for freetype. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) and potentially compromise a vulnerable
system.

For more information:
SA20100

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.0 alias woody --

Source archives:

http://security.debian.org/pool/updates/main/f/freetype/freetype_2.0.9-1woody1.dsc
Size/MD5 checksum: 672 e9f338a6cc7d4f8924ec9df3dd14035a
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.0.9-1woody1.diff.gz
Size/MD5 checksum: 17441 8313446b932167b006e7b039c6890821
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.0.9.orig.tar.gz
Size/MD5 checksum: 908842 102e1d651fd6404e656e3d1d8a36a4a0

Alpha architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_alpha.deb
Size/MD5 checksum: 72438 81cf505ba02eb5167141388fedd84177
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_alpha.deb
Size/MD5 checksum: 244742 599b407104960c51a32c75782ccc6bcb
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_alpha.deb
Size/MD5 checksum: 598368 f5bb8504b2d91b0af7cd878f661520d4

ARM architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_arm.deb
Size/MD5 checksum: 38802 0890e233c07cfa17fcf4de4e312ee0cb
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_arm.deb
Size/MD5 checksum: 211736 c071143fd0bcbba47e3be584dd52c9b5
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_arm.deb
Size/MD5 checksum: 565936 3ea6b5786fdc1b74c8ce501a83f87b56

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_i386.deb
Size/MD5 checksum: 37128 55f75b5277bc86e66167bd92019d0dc0
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_i386.deb
Size/MD5 checksum: 208990 c59dc78191132dcc3db2ad6e529ed872
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_i386.deb
Size/MD5 checksum: 541294 028c883672af3f15cdea4595e124d12d

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_ia64.deb
Size/MD5 checksum: 91606 34dd0d964ef7f5471a9d8aca9204eae6
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_ia64.deb
Size/MD5 checksum: 314490 f277129e151512f5f40f7dac92bd70ca
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_ia64.deb
Size/MD5 checksum: 661156 2da5eeaec642e9ad417f05d556042654

HP Precision architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_hppa.deb
Size/MD5 checksum: 65954 01f070e5a891f294673ecc02746e2a3e
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_hppa.deb
Size/MD5 checksum: 243240 3ce3f6c9c81f475e8f5025d891c6baa3
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_hppa.deb
Size/MD5 checksum: 581982 2cd9bf66c5fa0900b2bbd892cb4fe27e

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_m68k.deb
Size/MD5 checksum: 35004 9fb250326a6ec18855b526881bff1971
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_m68k.deb
Size/MD5 checksum: 202382 b914d6dca81b0a0bbcd51b41f14d285b
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_m68k.deb
Size/MD5 checksum: 533332 99c58bfb00e2eec28605797281ba7d91

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_mips.deb
Size/MD5 checksum: 65994 d095a3147f7bf29601a633e0981812ef
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_mips.deb
Size/MD5 checksum: 227602 a0bb3a1ec9f4d199b592e83e1f96cc62
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_mips.deb
Size/MD5 checksum: 585274 70ee8753fbc279405f51aa3f85c9277a

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_mipsel.deb
Size/MD5 checksum: 66068 4252d63c5c6fc9c2073a3c4f9a2c94b3
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_mipsel.deb
Size/MD5 checksum: 224940 cd715fcea79690133890d1ac51c897d5
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_mipsel.deb
Size/MD5 checksum: 582886 95ab06bdb92195b369f4b1394caace23

PowerPC architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_powerpc.deb
Size/MD5 checksum: 40060 11ce0afd84b3b6d72aeb6ad65f46d20b
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_powerpc.deb
Size/MD5 checksum: 220220 f3e618b284f001fb1aca10f09153580c
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_powerpc.deb
Size/MD5 checksum: 562794 1f79591fa630cc0c1843a5877782fa5b

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_s390.deb
Size/MD5 checksum: 39878 f4349eae5c74098119905d368c7b0e2e
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_s390.deb
Size/MD5 checksum: 217756 f025a5c14fd3c2c115076095565628a5
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_s390.deb
Size/MD5 checksum: 550812 667c68d66e3055fdc01ff3a028f5b065

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.0.9-1woody1_sparc.deb
Size/MD5 checksum: 49750 6c536054e3247e79bef317c60ca6b3b1
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.0.9-1woody1_sparc.deb
Size/MD5 checksum: 212828 cab02000c53126f833994914024f057f
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.0.9-1woody1_sparc.deb
Size/MD5 checksum: 549646 206cb2d25dd696a438e54c188bf83b2c


-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/f/freetype/freetype_2.1.7-2.5.dsc
Size/MD5 checksum: 677 89163a31332f8fd9602ee070e736db56
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.1.7-2.5.diff.gz
Size/MD5 checksum: 56830 e44f23774c76ec8744556393d1a67155
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.1.7.orig.tar.gz
Size/MD5 checksum: 1245623 991ff86e88b075ba363e876f4ea58680

Alpha architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_alpha.deb
Size/MD5 checksum: 88168 43fe03488f5298535877f31e514af2b5
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_alpha.deb
Size/MD5 checksum: 422428 ca66e5f4c34fe72139aec143d2267638
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_alpha.deb
Size/MD5 checksum: 784362 87d5c43d63e83523ed20051640b702c8

AMD64 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_amd64.deb
Size/MD5 checksum: 76236 3352ce99b2a88ca07d88f04c91b3dc3e
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_amd64.deb
Size/MD5 checksum: 389884 7262b08b4199214f93165ae412c9f467
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_amd64.deb
Size/MD5 checksum: 723734 fb33e8413b560d7afaeb02e59a76cf09

ARM architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_arm.deb
Size/MD5 checksum: 58730 55df9efbd4eb664f1783ee82a38f1844
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_arm.deb
Size/MD5 checksum: 352562 7abf762b31898aaca08668d0a96b6f2f
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_arm.deb
Size/MD5 checksum: 714506 954e50736413bdef43b26230c639de88

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_i386.deb
Size/MD5 checksum: 63194 cb8a719a9a774729d66008d9027e51e6
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_i386.deb
Size/MD5 checksum: 363860 db9690836e2cec4d75d72e21fa3454b2
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_i386.deb
Size/MD5 checksum: 693456 413e7c3ac3cbe875565583e4d715e9f9

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_ia64.deb
Size/MD5 checksum: 102602 33a1531632b9b99c8dddaf3db4bf5b76
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_ia64.deb
Size/MD5 checksum: 493270 d5c7f28e477780047c923279b96b3e4a
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_ia64.deb
Size/MD5 checksum: 843896 72048488bde93d3630b6b9da079e69e9

HP Precision architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_hppa.deb
Size/MD5 checksum: 80762 42a0bfccfaac7473755699a843e24a47
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_hppa.deb
Size/MD5 checksum: 406960 0c4175c2dd0e48b799e09d2afc12690f
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_hppa.deb
Size/MD5 checksum: 734430 89b01eb71ca9666bfda516a81b42279c

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_m68k.deb
Size/MD5 checksum: 43850 8c48fb2db89bd539888bee4b5e96bc9f
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_m68k.deb
Size/MD5 checksum: 359290 8d0540203484407b5e3ac0caa6a17a76
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_m68k.deb
Size/MD5 checksum: 678740 6a4a245d16be00bfb42c4c95bc46c33b

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_mips.deb
Size/MD5 checksum: 91802 edb71b520cad9ee3325f1ab6c9aba2e1
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_mips.deb
Size/MD5 checksum: 384104 a3a2b6850b6ad4fa58b26e4f87c99bc1
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_mips.deb
Size/MD5 checksum: 742462 1622c7ed6976c080c191bf4355a39bcf

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_mipsel.deb
Size/MD5 checksum: 91530 b5f2884e0a60f941472f73e5bb4ed36a
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_mipsel.deb
Size/MD5 checksum: 376154 44ecb1dd13695505127605383ba08550
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_mipsel.deb
Size/MD5 checksum: 735808 5be48a87080982898270d5d3872d23a1

PowerPC architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_powerpc.deb
Size/MD5 checksum: 81984 1947fae668eea39c6547b5f7223b161b
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_powerpc.deb
Size/MD5 checksum: 379112 ba3fcf9e41fb86ffb942f62da564e443
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_powerpc.deb
Size/MD5 checksum: 730110 abef79b7c668f78ac1824d28871d12e5

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_s390.deb
Size/MD5 checksum: 76224 cad554cfd04bc4d3a95b2a2ec2fdc0d5
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_s390.deb
Size/MD5 checksum: 399662 a0b113ed1c25426c878a88fa3709eab9
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_s390.deb
Size/MD5 checksum: 752436 294913dbf3d5371ea9bb20f44a03d5c0

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-2.5_sparc.deb
Size/MD5 checksum: 68422 5c7b16ad44271621f8d5212ddcedefe9
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-2.5_sparc.deb
Size/MD5 checksum: 363802 64e8b09bf5e357b284c23b284e5c13cc
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-2.5_sparc.deb
Size/MD5 checksum: 699974 ef249a5e5d11b534e55f1e942ef29cef

-- Debian GNU/Linux unstable alias sid --

The vulnerabilities will reportedly be fixed soon.

ORIGINAL ADVISORY:
http://www.us.debian.org/security/2006/dsa-1095

OTHER REFERENCES:
SA20100:
http://secunia.com/advisories/20100/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close