7.5
CVSSv2

CVE-2006-3467

Published: 21/07/2006 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in FreeType prior to 2.2 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.

Vulnerable Product Search on Vulmon Subscribe to Product

freetype freetype

Vendor Advisories

Debian Bug report logs - #379920 freetype: buffer overflow [CVE-2006-3467] Package: freetype; Maintainer for freetype is Hugh McMaster <hughmcmaster@outlookcom>; Reported by: Martin Pitt <martinpitt@ubuntucom> Date: Wed, 26 Jul 2006 11:33:01 UTC Severity: grave Tags: patch, security Found in version 221-2 Fixe ...
An integer overflow has been discovered in the FreeType library By tricking a user into installing and/or opening a specially crafted font file, these could be exploited to execute arbitrary code with the privileges of that user ...
An integer overflow has been discovered in Xorg’s font handling library By using a specially crafted font file, this could be exploited to crash the X server or execute arbitrary code with root privileges ...
Several vulnerabilities have been discovered in the X Window System, which may lead to the execution of arbitrary code or denial of service The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-3467 Chris Evan discovered an integer overflow in the code to handle PCF fonts, which might lead to denial ...
It was discovered that an integer overflow in freetype's PCF font code may lead to denial of service and potential execution of arbitrary code For the stable distribution (sarge) this problem has been fixed in version 217-6 For the unstable distribution (sid) this problem has been fixed in version 221-5 We recommend that you upgrade your fre ...

References

CWE-189http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593http://www.redhat.com/support/errata/RHSA-2006-0500.htmlhttp://secunia.com/advisories/21144ftp://patches.sgi.com/support/free/security/advisories/20060701-01-Uhttp://www.ubuntu.com/usn/usn-324-1http://securitytracker.com/id?1016522http://secunia.com/advisories/21232http://secunia.com/advisories/21135http://lists.suse.com/archive/suse-security-announce/2006-Aug/0002.htmlhttp://secunia.com/advisories/21285http://www.redhat.com/support/errata/RHSA-2006-0634.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0635.htmlhttp://secunia.com/advisories/21566http://secunia.com/advisories/21567http://security.gentoo.org/glsa/glsa-200609-04.xmlhttp://www.ubuntu.com/usn/usn-341-1http://secunia.com/advisories/21793http://secunia.com/advisories/21798http://secunia.com/advisories/21606http://secunia.com/advisories/21626http://support.avaya.com/elmodocs2/security/ASA-2006-176.htmhttp://support.avaya.com/elmodocs2/security/ASA-2006-186.htmhttp://secunia.com/advisories/21701http://secunia.com/advisories/21836http://www.debian.org/security/2006/dsa-1178http://www.trustix.org/errata/2006/0052/http://secunia.com/advisories/22027http://www.debian.org/security/2006/dsa-1193http://secunia.com/advisories/22332http://secunia.com/advisories/22907http://www.vmware.com/download/esx/esx-202-200610-patch.htmlhttp://www.vmware.com/download/esx/esx-213-200610-patch.htmlhttp://www.vmware.com/download/esx/esx-254-200610-patch.htmlhttp://secunia.com/advisories/22875http://support.avaya.com/elmodocs2/security/ASA-2006-284.htmhttp://secunia.com/advisories/23400http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1http://secunia.com/advisories/23939http://www.mandriva.com/security/advisories?name=MDKSA-2006:129http://www.mandriva.com/security/advisories?name=MDKSA-2006:148http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.htmlhttp://secunia.com/advisories/27271http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlhttp://secunia.com/advisories/33937http://support.apple.com/kb/HT3438http://www.vupen.com/english/advisories/2006/4522http://www.vupen.com/english/advisories/2006/4502http://www.vupen.com/english/advisories/2007/0381http://secunia.com/advisories/21062https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10673http://www.securityfocus.com/archive/1/451426/100/200/threadedhttp://www.securityfocus.com/archive/1/451419/100/200/threadedhttp://www.securityfocus.com/archive/1/451417/100/200/threadedhttp://www.securityfocus.com/archive/1/451404/100/0/threadedhttp://www.securityfocus.com/archive/1/444318/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920https://nvd.nist.govhttps://usn.ubuntu.com/324-1/