7.5
CVSSv2

CVE-2006-1861

Published: 23/05/2006 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in FreeType prior to 2.2 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by CVE-2006-2493.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype 2.1.9

freetype freetype 2.1.10

freetype freetype 2.1.5

freetype freetype 2.1.8

freetype freetype 2.1.3

freetype freetype 2.1.6

freetype freetype 2.0.9

freetype freetype 2.1.7

freetype freetype 2.1.4

Vendor Advisories

Several integer overflows have been discovered in the FreeType library By tricking a user into installing and/or opening a specially crafted font file, these could be exploited to execute arbitrary code with the privileges of that user ...
Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having important security impact by the RedHat Security Response Team ...
Synopsis Important: freetype security update Type/Severity Security Advisory: Important Topic Updated freetype packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 21This update has been rated as having important security impact by the RedHat Security Response Team ...
Several problems have been discovered in the FreeType 2 font engine The Common vulnerabilities and Exposures project identifies the following problems: CVE-2006-0747 Several integer underflows have been discovered which could allow remote attackers to cause a denial of service CVE-2006-1861 Chris Evans discovered several integer over ...

References

CWE-189https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593http://sourceforge.net/project/shownotes.php?release_id=416463https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606http://www.securityfocus.com/bid/18034http://secunia.com/advisories/20100http://www.debian.org/security/2006/dsa-1095http://secunia.com/advisories/20525http://secunia.com/advisories/20591http://secunia.com/advisories/20638http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.htmlhttp://secunia.com/advisories/20791http://security.gentoo.org/glsa/glsa-200607-02.xmlhttp://secunia.com/advisories/21000http://www.redhat.com/support/errata/RHSA-2006-0500.htmlhttp://secunia.com/advisories/21062ftp://patches.sgi.com/support/free/security/advisories/20060701-01-Uhttp://securitytracker.com/id?1016522http://secunia.com/advisories/21135https://issues.rpath.com/browse/RPL-429http://secunia.com/advisories/21385http://support.avaya.com/elmodocs2/security/ASA-2006-176.htmhttp://secunia.com/advisories/21701http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1http://secunia.com/advisories/23939http://www.gentoo.org/security/en/glsa/glsa-200710-09.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:099http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.htmlhttp://secunia.com/advisories/27162http://secunia.com/advisories/27167http://secunia.com/advisories/27271http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://secunia.com/advisories/35204http://www.redhat.com/support/errata/RHSA-2009-1062.htmlhttp://www.redhat.com/support/errata/RHSA-2009-0329.htmlhttp://secunia.com/advisories/35200https://bugzilla.redhat.com/show_bug.cgi?id=502565https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.htmlhttp://secunia.com/advisories/35233http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2006/1868http://www.vupen.com/english/advisories/2007/0381https://exchange.xforce.ibmcloud.com/vulnerabilities/26553https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124https://usn.ubuntu.com/291-1/http://www.securityfocus.com/archive/1/436836/100/0/threadedhttps://usn.ubuntu.com/291-1/https://nvd.nist.gov