Vulnerability Name:

CVE-2006-0747 (CCN-28549)

Assigned:2006-05-15
Published:2006-05-15
Updated:2018-10-19
Summary:Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Denial of Service
References:Source: SGI
Type: UNKNOWN
20060701-01-U

Source: MITRE
Type: CNA
CVE-2006-0747

Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-05-12

Source: SUSE
Type: UNKNOWN
SUSE-SA:2006:037

Source: CCN
Type: RHSA-2006-0500
freetype security update

Source: SECUNIA
Type: Vendor Advisory
20525

Source: SECUNIA
Type: Vendor Advisory
20591

Source: SECUNIA
Type: Vendor Advisory
20638

Source: SECUNIA
Type: Vendor Advisory
20791

Source: SECUNIA
Type: Vendor Advisory
21062

Source: SECUNIA
Type: Vendor Advisory
21135

Source: SECUNIA
Type: Vendor Advisory
21385

Source: CCN
Type: SA21701
Avaya Products FreeType Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
21701

Source: CCN
Type: SA23939
Sun Solaris FreeType Integer Overflow and Underflow Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
23939

Source: CCN
Type: SA35074
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
35074

Source: CCN
Type: SECTRACK ID: 1016522
FreeType Integer Overflows Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016522

Source: CCN
Type: Sun Alert ID: 102705
Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine

Source: SUNALERT
Type: UNKNOWN
102705

Source: CCN
Type: Apple Web site
About the security content of Security Update 2009-002 / Mac OS X v10.5.7

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3549

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm

Source: CCN
Type: ASA-2006-176
freetype security update (RHSA-2006-0500)

Source: CCN
Type: ASA-2007-039
Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine (Sun 102705)

Source: DEBIAN
Type: UNKNOWN
DSA-1095

Source: DEBIAN
Type: DSA-1095
freetype -- integer overflows

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:099

Source: CCN
Type: OpenPKG-SA-2006.017
Freetype

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0500

Source: BUGTRAQ
Type: UNKNOWN
20060612 rPSA-2006-0100-1 freetype

Source: BID
Type: UNKNOWN
18326

Source: CCN
Type: BID-18326
FreeType TTF File Remote Buffer Overflow Vulnerability

Source: CCN
Type: USN-291-1
FreeType vulnerabilities

Source: CERT
Type: US Government Resource
TA09-133A

Source: VUPEN
Type: Vendor Advisory
ADV-2007-0381

Source: VUPEN
Type: Vendor Advisory
ADV-2009-1297

Source: CONFIRM
Type: Patch
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676

Source: XF
Type: UNKNOWN
freetype-font-file-dos(28549)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-429

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9508

Source: UBUNTU
Type: UNKNOWN
USN-291-1

Source: SUSE
Type: SUSE-SA:2006:037
freetype integer overflow problems

Vulnerable Configuration:Configuration 1:
  • cpe:/a:freetype:freetype:*:*:*:*:*:*:*:* (Version <= 2.1)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20060747
    V
    CVE-2006-0747
    2015-11-16
    oval:org.mitre.oval:def:9508
    V
    Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.
    2013-04-29
    oval:com.redhat.rhsa:def:20060500
    P
    RHSA-2006:0500: freetype security update (Moderate)
    2008-03-20
    oval:org.debian:def:1095
    V
    integer overflows
    2006-06-10
    BACK
    freetype freetype *
    apple mac os x 10.4.11
    apple mac os x server 10.4.11
    debian debian linux 3.0
    openpkg openpkg current
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    suse suse linux 9.0
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    suse suse linux 9.2
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake multi network firewall 2.0
    suse suse linux 10.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 2006
    openpkg openpkg 2.5
    canonical ubuntu 6.06
    suse suse linux 10.1
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 3.0
    suse suse linux 9.3