Vulnerability CVE-2006-3467: Information

Description

Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.

Severity: HIGH (7.5)

Published: July 21, 2006
Modified: Feb. 13, 2023
Error type identifier: CWE-189

References to Advisories, Solutions, and Tools

Hyperlink
Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
    RHSA-2006:0500
    • Patch
    • Vendor Advisory
    21144
    • Vendor Advisory
    20060701-01-U
      USN-324-1
        1016522
          21232
          • Vendor Advisory
          21135
          • Vendor Advisory
          SUSE-SA:2006:045
            21285
            • Vendor Advisory
            RHSA-2006:0634
            • Vendor Advisory
            RHSA-2006:0635
            • Vendor Advisory
            21566
            • Vendor Advisory
            21567
            • Vendor Advisory
            GLSA-200609-04
              USN-341-1
                21793
                • Vendor Advisory
                21798
                • Vendor Advisory
                21606
                • Vendor Advisory
                21626
                • Vendor Advisory
                http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
                  http://support.avaya.com/elmodocs2/security/ASA-2006-186.htm
                    21701
                    • Vendor Advisory
                    21836
                    • Vendor Advisory
                    DSA-1178
                      2006-0052
                        22027
                        • Vendor Advisory
                        DSA-1193
                          22332
                          • Vendor Advisory
                          22907
                          • Vendor Advisory
                          http://www.vmware.com/download/esx/esx-202-200610-patch.html
                            http://www.vmware.com/download/esx/esx-213-200610-patch.html
                              http://www.vmware.com/download/esx/esx-254-200610-patch.html
                                22875
                                • Vendor Advisory
                                http://support.avaya.com/elmodocs2/security/ASA-2006-284.htm
                                  23400
                                  • Vendor Advisory
                                  102705
                                    23939
                                    • Vendor Advisory
                                    MDKSA-2006:129
                                      MDKSA-2006:148
                                        SUSE-SR:2007:021
                                          27271
                                          • Vendor Advisory
                                          APPLE-SA-2009-02-12
                                            33937
                                              http://support.apple.com/kb/HT3438
                                                ADV-2006-4522
                                                  ADV-2006-4502
                                                    ADV-2007-0381
                                                      21062
                                                        oval:org.mitre.oval:def:10673
                                                          20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
                                                            20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1
                                                              20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
                                                                20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
                                                                  20060825 rPSA-2006-0157-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs
                                                                      1. Configuration 1

                                                                        cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
                                                                        End including
                                                                        2.1