Vulnerability Name: | CVE-2006-1861 (CCN-26553) | ||||||||||||||||||||||||
Assigned: | 2006-05-15 | ||||||||||||||||||||||||
Published: | 2006-05-15 | ||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||
Summary: | Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. Note: item 4 was originally identified by CVE-2006-2493. | ||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: MITRE Type: CNA CVE-2006-1861 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2006-0500 freetype security update Source: CCN Type: RHSA-2009-0329 Important: freetype security update Source: CCN Type: RHSA-2009-1062 Important: freetype security update Source: CCN Type: SA20100 FreeType Integer Overflow and Underflow Vulnerabilities Source: CCN Type: SA21701 Avaya Products FreeType Vulnerabilities Source: CCN Type: SA23939 Sun Solaris FreeType Integer Overflow and Underflow Vulnerabilities Source: CCN Type: SA27162 NX Server PCF Integer Overflow Vulnerabilities Source: CCN Type: SA33937 Apple Mac OS X Security Update Fixes Multiple Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: SECTRACK ID: 1016522 FreeType Integer Overflows Let Remote Users Execute Arbitrary Code Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: SourceForge.net: Files The FreeType Project - File Release Notes and Changelog - Release Name: 2.2.1 Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: CCN Type: Sun Alert ID: 102705 Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Apple Web site About the security content of Security Update 2009-001 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: ASA-2006-176 freetype security update (RHSA-2006-0500) Source: CCN Type: ASA-2007-039 Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine (Sun 102705) Source: CCN Type: ASA-2009-226 freetype security update (RHSA-2009-0329) Source: CCN Type: ASA-2009-243 freetype security update (RHSA-2009-1062) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: DEBIAN Type: DSA-1095 freetype -- integer overflows Source: CCN Type: GLSA-200607-02 FreeType: Multiple integer overflows Source: CCN Type: GLSA-200710-09 NX 2.1: User-assisted execution of arbitrary code Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GLSA-201006-01 FreeType 1: User-assisted execution of arbitrary code Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: OpenPKG-SA-2006.017 Freetype Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-18034 FreeType LWFN Files Buffer Overflow Vulnerability Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: CCN Type: USN-291-1 FreeType vulnerabilities Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN freetype-lwfn-overflow(26553) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: SUSE Type: SUSE-SA:2006:037 freetype integer overflow problems Source: SUSE Type: SUSE-SR:2007:021 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |