Summary
The remote host is missing an update to freetype
announced via advisory USN-767-1.
Solution
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS:
libfreetype6 2.1.10-1ubuntu2.6
Ubuntu 8.04 LTS:
libfreetype6 2.3.5-1ubuntu4.8.04.2
Ubuntu 8.10:
libfreetype6 2.3.7-2ubuntu1.1
Ubuntu 9.04:
libfreetype6 2.3.9-4ubuntu0.1
After a standard system upgrade you need to restart your session to effect the necessary changes.
https://secure1.securityspace.com/smysecure/catid.html?in=USN-767-1
Insight
Tavis Ormandy discovered that FreeType did not correctly handle certain large values in font files. If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges.
Severity
Classification
-
CVE CVE-2008-5814, CVE-2009-0798, CVE-2009-0946, CVE-2009-1271, CVE-2009-1313 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities