Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
References
Configurations
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U - | |
References | () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593 - | |
References | () http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html - | |
References | () http://lists.suse.com/archive/suse-security-announce/2006-Aug/0002.html - | |
References | () http://secunia.com/advisories/21062 - | |
References | () http://secunia.com/advisories/21135 - Vendor Advisory | |
References | () http://secunia.com/advisories/21144 - Vendor Advisory | |
References | () http://secunia.com/advisories/21232 - Vendor Advisory | |
References | () http://secunia.com/advisories/21285 - Vendor Advisory | |
References | () http://secunia.com/advisories/21566 - Vendor Advisory | |
References | () http://secunia.com/advisories/21567 - Vendor Advisory | |
References | () http://secunia.com/advisories/21606 - Vendor Advisory | |
References | () http://secunia.com/advisories/21626 - Vendor Advisory | |
References | () http://secunia.com/advisories/21701 - Vendor Advisory | |
References | () http://secunia.com/advisories/21793 - Vendor Advisory | |
References | () http://secunia.com/advisories/21798 - Vendor Advisory | |
References | () http://secunia.com/advisories/21836 - Vendor Advisory | |
References | () http://secunia.com/advisories/22027 - Vendor Advisory | |
References | () http://secunia.com/advisories/22332 - Vendor Advisory | |
References | () http://secunia.com/advisories/22875 - Vendor Advisory | |
References | () http://secunia.com/advisories/22907 - Vendor Advisory | |
References | () http://secunia.com/advisories/23400 - Vendor Advisory | |
References | () http://secunia.com/advisories/23939 - Vendor Advisory | |
References | () http://secunia.com/advisories/27271 - Vendor Advisory | |
References | () http://secunia.com/advisories/33937 - | |
References | () http://security.gentoo.org/glsa/glsa-200609-04.xml - | |
References | () http://securitytracker.com/id?1016522 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1 - | |
References | () http://support.apple.com/kb/HT3438 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-186.htm - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-284.htm - | |
References | () http://www.debian.org/security/2006/dsa-1178 - | |
References | () http://www.debian.org/security/2006/dsa-1193 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:129 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:148 - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0500.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0634.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0635.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/444318/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/451404/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/451417/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/451419/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/451426/100/200/threaded - | |
References | () http://www.trustix.org/errata/2006/0052/ - | |
References | () http://www.ubuntu.com/usn/usn-324-1 - | |
References | () http://www.ubuntu.com/usn/usn-341-1 - | |
References | () http://www.vmware.com/download/esx/esx-202-200610-patch.html - | |
References | () http://www.vmware.com/download/esx/esx-213-200610-patch.html - | |
References | () http://www.vmware.com/download/esx/esx-254-200610-patch.html - | |
References | () http://www.vupen.com/english/advisories/2006/4502 - | |
References | () http://www.vupen.com/english/advisories/2006/4522 - | |
References | () http://www.vupen.com/english/advisories/2007/0381 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10673 - |
Information
Published : 2006-07-21 14:03
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3467
Mitre link : CVE-2006-3467
CVE.ORG link : CVE-2006-3467
JSON object : View
Products Affected
freetype
- freetype
CWE
CWE-189
Numeric Errors