CVE-2006-0747
CVSS5.0
发布时间 :2006-05-23 06:06:00
修订时间 :2011-10-11 00:00:00
NMCOPS    

[原文]Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.


[CNNVD]FreeType pshglob.c文件 psh_blues_set_zones_0()函数整数溢出漏洞(CNNVD-200605-447)

        FreeType是一个流行的字体函数库。
        FreeType的src/pshinter/pshglob.c文件的psh_blues_set_zones_0()函数中存在溢出漏洞。由于read_count为无符整型,以2递减,因此攻击者可以通过控制read_count为奇数导致整数下溢。一旦溢出了read_count,循环就会向堆中dump垃圾数据,导致崩溃。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-189 [数值错误]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9508Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0747
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-447
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA09-133A.html
(UNKNOWN)  CERT  TA09-133A
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676
(PATCH)  CONFIRM  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676
https://issues.rpath.com/browse/RPL-429
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-429
http://www.vupen.com/english/advisories/2009/1297
(VENDOR_ADVISORY)  VUPEN  ADV-2009-1297
http://www.vupen.com/english/advisories/2007/0381
(VENDOR_ADVISORY)  VUPEN  ADV-2007-0381
http://www.ubuntulinux.org/support/documentation/usn/usn-291-1
(UNKNOWN)  UBUNTU  USN-291-1
http://www.securityfocus.com/bid/18326
(UNKNOWN)  BID  18326
http://www.securityfocus.com/archive/1/archive/1/436836/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060612 rPSA-2006-0100-1 freetype
http://www.redhat.com/support/errata/RHSA-2006-0500.html
(UNKNOWN)  REDHAT  RHSA-2006:0500
http://www.mandriva.com/security/advisories?name=MDKSA-2006:099
(UNKNOWN)  MANDRIVA  MDKSA-2006:099
http://www.debian.org/security/2006/dsa-1095
(UNKNOWN)  DEBIAN  DSA-1095
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
http://support.apple.com/kb/HT3549
(UNKNOWN)  CONFIRM  http://support.apple.com/kb/HT3549
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
(UNKNOWN)  SUNALERT  102705
http://securitytracker.com/id?1016522
(UNKNOWN)  SECTRACK  1016522
http://secunia.com/advisories/35074
(VENDOR_ADVISORY)  SECUNIA  35074
http://secunia.com/advisories/23939
(VENDOR_ADVISORY)  SECUNIA  23939
http://secunia.com/advisories/21701
(VENDOR_ADVISORY)  SECUNIA  21701
http://secunia.com/advisories/21385
(VENDOR_ADVISORY)  SECUNIA  21385
http://secunia.com/advisories/21135
(VENDOR_ADVISORY)  SECUNIA  21135
http://secunia.com/advisories/21062
(VENDOR_ADVISORY)  SECUNIA  21062
http://secunia.com/advisories/20791
(VENDOR_ADVISORY)  SECUNIA  20791
http://secunia.com/advisories/20638
(VENDOR_ADVISORY)  SECUNIA  20638
http://secunia.com/advisories/20591
(VENDOR_ADVISORY)  SECUNIA  20591
http://secunia.com/advisories/20525
(VENDOR_ADVISORY)  SECUNIA  20525
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
(UNKNOWN)  SUSE  SUSE-SA:2006:037
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
(UNKNOWN)  APPLE  APPLE-SA-2009-05-12
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
(UNKNOWN)  SGI  20060701-01-U

- 漏洞信息

FreeType pshglob.c文件 psh_blues_set_zones_0()函数整数溢出漏洞
中危 数字错误
2006-05-23 00:00:00 2009-05-16 00:00:00
远程  
        FreeType是一个流行的字体函数库。
        FreeType的src/pshinter/pshglob.c文件的psh_blues_set_zones_0()函数中存在溢出漏洞。由于read_count为无符整型,以2递减,因此攻击者可以通过控制read_count为奇数导致整数下溢。一旦溢出了read_count,循环就会向堆中dump垃圾数据,导致崩溃。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.debian.org/security/2006/dsa-1095
        http://prdownloads.sourceforge.net/freetype/freetype-2.2.1.tar.bz2?download

- 漏洞信息 (F48762)

OpenPKG Security Advisory 2006.17 (PacketStormID:F48762)
2006-08-03 00:00:00
OpenPKG Foundation  openpkg.org
advisory
CVE-2006-3467,CVE-2006-2661,CVE-2006-2493,CVE-2006-0747
[点击下载]

OpenPKG Security Advisory OpenPKG-SA-2006.017 - Multiple security issues exist in the FreeType font rendering library before version 2.2.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory                            The OpenPKG Project
http://www.openpkg.org/security/                  http://www.openpkg.org
openpkg-security@openpkg.org                         openpkg@openpkg.org
OpenPKG-SA-2006.017                                          28-Jul-2006
________________________________________________________________________

Package:             freetype
Vulnerability:       denial of service, arbitrary code execution
OpenPKG Specific:    no

Affected Releases:   Affected Packages:       Corrected Packages:
OpenPKG CURRENT      N.A.                     N.A.
OpenPKG 2-STABLE     N.A.                     N.A.
OpenPKG 2.5-RELEASE  <= freetype-2.1.10-2.5.0 >= freetype-2.1.10-2.5.1

Description:
  Multiple security issues exist in the FreeType [1] font rendering
  library before version 2.2:

  An integer overflow allows remote attackers to cause a Denial of
  Service (DoS) and possibly execute arbitrary code via unknown vectors,
  as demonstrated by the Red Hat "bad1.pcf" test file, due to a partial
  fix of CVE-2006-1861. The Common Vulnerabilities and Exposures (CVE)
  project assigned the id CVE-2006-3467 [2] to the problem.

  Remote attackers can cause a Denial of Service (DoS) via a specially
  crafted font file that triggers a NULL dereference. The Common
  Vulnerabilities and Exposures (CVE) project assigned the id
  CVE-2006-2661 [3] to the problem.

  Multiple integer overflows allow remote attackers to cause a
  Denial of Service (DoS) and possibly execute arbitrary code. The
  Common Vulnerabilities and Exposures (CVE) project assigned the
  id CVE-2006-1861 [4] to the problem. Parts of this issue the
  Common Vulnerabilities and Exposures (CVE) project assigned the id
  CVE-2006-2493, which is now rejected.

  Integer underflow allows remote attackers to cause a Denial of Service
  (DoS) via a specially crafted font file with an odd number of "blue"
  values, which causes the underflow when decrementing by 2 in a context
  that assumes an even number of values. The Common Vulnerabilities
  and Exposures (CVE) project assigned the id CVE-2006-0747 [5] to the
  problem.

  An additional flaw causes some programs to go into an infinite loop
  and this way cause a Denial of Service (DoS) when dealing with fonts
  that don't have a properly sorted kerning sub-table.
________________________________________________________________________

References:
  [1] http://www.freetype.org/
  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
  [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661
  [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
  [5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747
________________________________________________________________________

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <openpkg@openpkg.org>" (ID 63C4CB9F) of the
OpenPKG project which you can retrieve from http://pgp.openpkg.org and
hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org
for details on how to verify the integrity of this advisory.
________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG <openpkg@openpkg.org>

iD8DBQFEyfw3gHWT4GPEy58RAiB1AKDKGX5q6ovQuoQXjnV9KY3jvCLJNgCgxCdg
difG4d5DnORPqstdPAUejm8=
=hbbe
-----END PGP SIGNATURE-----
    

- 漏洞信息

26032
FreeType Font File Malformed Blue Value Processing DoS
Denial of Service
Loss of Availability
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-05-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

FreeType TTF File Remote Buffer Overflow Vulnerability
Boundary Condition Error 18326
Yes No
2006-06-08 12:00:00 2009-05-13 06:56:00
Josh Bressers discovered this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Sun Solaris 9_x86
Sun Solaris 9
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 10.0_x86
Sun Solaris 10.0
SGI ProPack 3.0 SP6
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
rPath rPath Linux 1
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
FreeType FreeType 2.2
FreeType FreeType 0
Avaya S8710 R2.0.1
Avaya S8710 R2.0.0
Avaya S8700 R2.0.1
Avaya S8700 R2.0.0
Avaya S8500 R2.0.1
Avaya S8500 R2.0.0
Avaya S8300 R2.0.1
Avaya S8300 R2.0.0
Avaya Messaging Storage Server MM3.0
Avaya Messaging Storage Server
Avaya Message Networking
Avaya Intuity LX
Apple Mac OS X Server 10.4.11
Apple Mac OS X Server 10.4.11
Apple Mac OS X Server 10.4.10
Apple Mac OS X Server 10.4.9
Apple Mac OS X Server 10.4.8
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4
Apple Mac OS X 10.4.11
Apple Mac OS X 10.4.11
Apple Mac OS X 10.4.10
Apple Mac OS X 10.4.9
Apple Mac OS X 10.4.8
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4
FreeType FreeType 2.2.1
+ OpenPKG OpenPKG E1.0-Solid
+ Trustix Secure Linux 3.0.5
+ Trustix Secure Linux 3.0
+ Trustix Secure Linux 2.2

- 不受影响的程序版本

FreeType FreeType 2.2.1
+ OpenPKG OpenPKG E1.0-Solid
+ Trustix Secure Linux 3.0.5
+ Trustix Secure Linux 3.0
+ Trustix Secure Linux 2.2

- 漏洞讨论

FreeType is prone to a buffer-overflow vulnerability. This issue is due to an integer-underflow that results in a buffer being overrun with attacker-supplied data.

This issue allows remote attackers to execute arbitrary machine code in the context of applications that use the affected library. Failed exploit attempts will likely crash applications, denying service to legitimate users.

FreeType versions prior to 2.2.1 are vulnerable to this issue.

- 漏洞利用

The following proof-of-concept exploit demonstrates this issue by instigating a crash in the affected library:

- 解决方案

The vendor has released FreeType 2.2.1 to address this issue. Please see the references for details.


Sun Solaris 10.0

FreeType FreeType 2.2

Sun Solaris 8_sparc

Sun Solaris 10.0_x86

FreeType FreeType 0

Sun Solaris 9

Sun Solaris 9_x86

Sun Solaris 8_x86

Apple Mac OS X 10.4.11

Apple Mac OS X Server 10.4.11

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站