Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2006-3467
Description:Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
Test IDs: 1.3.6.1.4.1.25623.1.0.62297   1.3.6.1.4.1.25623.1.0.57409   1.3.6.1.4.1.25623.1.0.57185   1.3.6.1.4.1.25623.1.0.62281   1.3.6.1.4.1.25623.1.0.65031   1.3.6.1.4.1.25623.1.0.57342   1.3.6.1.4.1.25623.1.0.57882   1.3.6.1.4.1.25623.1.0.57382   1.3.6.1.4.1.25623.1.0.58696   1.3.6.1.4.1.25623.1.0.57287   1.3.6.1.4.1.25623.1.0.57431   1.3.6.1.4.1.25623.1.0.59367   1.3.6.1.4.1.25623.1.0.57273   1.3.6.1.4.1.25623.1.0.62284   1.3.6.1.4.1.25623.1.0.57272  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2006-3467
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Bugtraq: 20060825 rPSA-2006-0157-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs (Google Search)
http://www.securityfocus.com/archive/1/444318/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Debian Security Information: DSA-1178 (Google Search)
http://www.debian.org/security/2006/dsa-1178
Debian Security Information: DSA-1193 (Google Search)
http://www.debian.org/security/2006/dsa-1193
http://security.gentoo.org/glsa/glsa-200609-04.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:129
http://www.mandriva.com/security/advisories?name=MDKSA-2006:148
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10673
RedHat Security Advisories: RHSA-2006:0500
http://www.redhat.com/support/errata/RHSA-2006-0500.html
RedHat Security Advisories: RHSA-2006:0634
http://www.redhat.com/support/errata/RHSA-2006-0634.html
RedHat Security Advisories: RHSA-2006:0635
http://www.redhat.com/support/errata/RHSA-2006-0635.html
http://securitytracker.com/id?1016522
http://secunia.com/advisories/21062
http://secunia.com/advisories/21135
http://secunia.com/advisories/21144
http://secunia.com/advisories/21232
http://secunia.com/advisories/21285
http://secunia.com/advisories/21566
http://secunia.com/advisories/21567
http://secunia.com/advisories/21606
http://secunia.com/advisories/21626
http://secunia.com/advisories/21701
http://secunia.com/advisories/21793
http://secunia.com/advisories/21798
http://secunia.com/advisories/21836
http://secunia.com/advisories/22027
http://secunia.com/advisories/22332
http://secunia.com/advisories/22875
http://secunia.com/advisories/22907
http://secunia.com/advisories/23400
http://secunia.com/advisories/23939
http://secunia.com/advisories/27271
http://secunia.com/advisories/33937
SGI Security Advisory: 20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
SuSE Security Announcement: SUSE-SA:2006:045 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Aug/0002.html
SuSE Security Announcement: SUSE-SR:2007:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
http://www.trustix.org/errata/2006/0052/
http://www.ubuntu.com/usn/usn-324-1
http://www.ubuntu.com/usn/usn-341-1
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/4522
http://www.vupen.com/english/advisories/2007/0381




© 1998-2024 E-Soft Inc. All rights reserved.