Vulnerability Name:

CVE-2006-1861 (CCN-26553)

Assigned:2006-05-15
Published:2006-05-15
Updated:2023-02-13
Summary:Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.
Note: item 4 was originally identified by CVE-2006-2493.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: MITRE
Type: CNA
CVE-2006-1861

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2006-0500
freetype security update

Source: CCN
Type: RHSA-2009-0329
Important: freetype security update

Source: CCN
Type: RHSA-2009-1062
Important: freetype security update

Source: CCN
Type: SA20100
FreeType Integer Overflow and Underflow Vulnerabilities

Source: CCN
Type: SA21701
Avaya Products FreeType Vulnerabilities

Source: CCN
Type: SA23939
Sun Solaris FreeType Integer Overflow and Underflow Vulnerabilities

Source: CCN
Type: SA27162
NX Server PCF Integer Overflow Vulnerabilities

Source: CCN
Type: SA33937
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: SECTRACK ID: 1016522
FreeType Integer Overflows Let Remote Users Execute Arbitrary Code

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: SourceForge.net: Files
The FreeType Project - File Release Notes and Changelog - Release Name: 2.2.1

Source: secalert@redhat.com
Type: Patch
secalert@redhat.com

Source: CCN
Type: Sun Alert ID: 102705
Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Apple Web site
About the security content of Security Update 2009-001

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: ASA-2006-176
freetype security update (RHSA-2006-0500)

Source: CCN
Type: ASA-2007-039
Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine (Sun 102705)

Source: CCN
Type: ASA-2009-226
freetype security update (RHSA-2009-0329)

Source: CCN
Type: ASA-2009-243
freetype security update (RHSA-2009-1062)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: DEBIAN
Type: DSA-1095
freetype -- integer overflows

Source: CCN
Type: GLSA-200607-02
FreeType: Multiple integer overflows

Source: CCN
Type: GLSA-200710-09
NX 2.1: User-assisted execution of arbitrary code

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-201006-01
FreeType 1: User-assisted execution of arbitrary code

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: OpenPKG-SA-2006.017
Freetype

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-18034
FreeType LWFN Files Buffer Overflow Vulnerability

Source: secalert@redhat.com
Type: Patch
secalert@redhat.com

Source: CCN
Type: USN-291-1
FreeType vulnerabilities

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
freetype-lwfn-overflow(26553)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: SUSE
Type: SUSE-SA:2006:037
freetype integer overflow problems

Source: SUSE
Type: SUSE-SR:2007:021
SUSE Security Summary Report

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20061861
    V
    CVE-2006-1861
    2015-11-16
    oval:org.mitre.oval:def:9124
    V
    Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by CVE-2006-2493.
    2013-04-29
    oval:com.redhat.rhsa:def:20090329
    P
    RHSA-2009:0329: freetype security update (Important)
    2009-05-22
    oval:com.redhat.rhsa:def:20060500
    P
    RHSA-2006:0500: freetype security update (Moderate)
    2008-03-20
    oval:org.debian:def:1095
    V
    integer overflows
    2006-06-10
    BACK