First published: Mon May 15 2006(Updated: )
Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by <a href="https://access.redhat.com/security/cve/CVE-2006-2493">CVE-2006-2493</a>. <a href="http://www.securityfocus.com/archive/1/archive/1/436836/100/0/threaded">http://www.securityfocus.com/archive/1/archive/1/436836/100/0/threaded</a> <a href="http://sourceforge.net/project/shownotes.php?release_id=416463">http://sourceforge.net/project/shownotes.php?release_id=416463</a> <a href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593</a> <a href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8</a> <a href="https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606">https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606</a> <a href="https://issues.rpath.com/browse/RPL-429">https://issues.rpath.com/browse/RPL-429</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freetype | <0:2.0.3-17.el21 | 0:2.0.3-17.el21 |
redhat/freetype | <0:2.1.4-4.0.rhel3.2 | 0:2.1.4-4.0.rhel3.2 |
redhat/freetype | <0:2.1.4-12.el3 | 0:2.1.4-12.el3 |
redhat/freetype | <0:2.1.9-1.rhel4.4 | 0:2.1.9-1.rhel4.4 |
redhat/freetype | <0:2.1.9-10.el4.7 | 0:2.1.9-10.el4.7 |
FreeType | =2.0.9 | |
FreeType | =2.1.3 | |
FreeType | =2.1.4 | |
FreeType | =2.1.5 | |
FreeType | =2.1.6 | |
FreeType | =2.1.7 | |
FreeType | =2.1.8 | |
FreeType | =2.1.9 | |
FreeType | =2.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2006-1861 is classified as a high severity vulnerability due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2006-1861, you should upgrade FreeType to version 2.1.10 or later, which includes patches for the vulnerability.
CVE-2006-1861 affects FreeType versions prior to 2.1.10.
Yes, CVE-2006-1861 can be exploited remotely by attackers through crafted files that trigger integer overflows.
Systems running affected versions of FreeType, such as those on Red Hat Enterprise Linux, are vulnerable to CVE-2006-1861.