SB2017082907 - Debian update for fontforge
Published: August 29, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Heap-based buffer over-read (CVE-ID: CVE-2017-11568)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to heap-based buffer over-read in PSCharStringToSplines (psread.c). A remote attacker can trick the victim into opening a specially crafted otf file and cause the application to crash or execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Heap-based buffer over-read (CVE-ID: CVE-2017-11569)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to heap-based buffer over-read in readttfcopyrights (parsettf.c). A remote attacker can trick the victim into opening a specially crafted otf file and cause the application to crash or execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
3) Stack-based buffer overflow (CVE-ID: CVE-2017-11571)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to stack-based buffer overflow in addnibble (parsettf.c). A remote attacker can trick the victim into opening a specially crafted otf file and cause the application to crash or execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
4) Heap-based buffer over-read (CVE-ID: CVE-2017-11572)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to heap-based buffer over-read in readttfcopyrights (parsettf.c). A remote attacker can trick the victim into opening a specially crafted otf file and cause the application to crash or execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
5) Heap-based buffer overflow (CVE-ID: CVE-2017-11574)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to heap-based buffer overflow in readcffset (parsettf.c). A remote attacker can trick the victim into opening a specially crafted otf file and cause the application to crash or execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
6) Buffer over-read (CVE-ID: CVE-2017-11575)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to buffer over-read in strnmatch (char.c). A remote attacker can trick the victim into opening a specially crafted otf file, trigger call from the readttfcopyrights function in parsettf.c. and cause the application to crash or execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
7) Denial of service (CVE-ID: CVE-2017-11576)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to an error when ensuring a positive size in a weight vector memcpy call in readcfftopdict (parsettf.c). A remote attacker can trick the victim into opening a specially crafted otf file and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
8) Buffer over-read (CVE-ID: CVE-2017-11577)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to buffer over-read in getsid (parsettf.c). A remote attacker can trick the victim into opening a specially crafted otf file and cause the application to crash or execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.