Vulnerability Name: | CVE-2006-2661 (CCN-28548) | ||||||||||||||||||||
Assigned: | 2006-05-15 | ||||||||||||||||||||
Published: | 2006-05-15 | ||||||||||||||||||||
Updated: | 2021-04-05 | ||||||||||||||||||||
Summary: | ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference. | ||||||||||||||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: SGI Type: Broken Link 20060701-01-U Source: MITRE Type: CNA CVE-2006-2661 Source: SUSE Type: Broken Link SUSE-SA:2006:037 Source: CCN Type: RHSA-2006-0500 freetype security update Source: SECUNIA Type: Third Party Advisory 20525 Source: SECUNIA Type: Third Party Advisory 20591 Source: SECUNIA Type: Third Party Advisory 20638 Source: SECUNIA Type: Third Party Advisory 20791 Source: SECUNIA Type: Third Party Advisory 21062 Source: SECUNIA Type: Third Party Advisory 21135 Source: SECUNIA Type: Third Party Advisory 21385 Source: CCN Type: SA21701 Avaya Products FreeType Vulnerabilities Source: SECUNIA Type: Third Party Advisory 21701 Source: CCN Type: SA23939 Sun Solaris FreeType Integer Overflow and Underflow Vulnerabilities Source: SECUNIA Type: Third Party Advisory 23939 Source: CCN Type: SECTRACK ID: 1016520 FreeType Null Pointer Dereference in `ftutil.c` Lets Remote Users Deny Service Source: SECTRACK Type: Third Party Advisory, VDB Entry 1016520 Source: CCN Type: Sun Alert ID: 102705 Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine Source: SUNALERT Type: Broken Link 102705 Source: CONFIRM Type: Third Party Advisory http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm Source: CCN Type: ASA-2006-176 freetype security update (RHSA-2006-0500) Source: CCN Type: ASA-2007-039 Security Vulnerabilities (Integer Overflows and a Denial of Service) in the FreeType 2 Font Engine (Sun 102705) Source: DEBIAN Type: Third Party Advisory DSA-1095 Source: DEBIAN Type: DSA-1095 freetype -- integer overflows Source: MANDRIVA Type: Third Party Advisory MDKSA-2006:099 Source: CCN Type: OpenPKG-SA-2006.017 Freetype Source: REDHAT Type: Third Party Advisory RHSA-2006:0500 Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20060612 rPSA-2006-0100-1 freetype Source: BID Type: Third Party Advisory, VDB Entry 18329 Source: CCN Type: BID-18329 FreeType TTF File Remote Denial of Service Vulnerability Source: CCN Type: USN-291-1 FreeType vulnerabilities Source: VUPEN Type: Third Party Advisory ADV-2007-0381 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676 Source: XF Type: UNKNOWN freetype-ftutil-dos(28548) Source: CONFIRM Type: Broken Link https://issues.rpath.com/browse/RPL-429 Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:11692 Source: UBUNTU Type: Third Party Advisory USN-291-1 Source: SUSE Type: SUSE-SA:2006:037 freetype integer overflow problems | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |