First published: Mon May 15 2006(Updated: )
Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by <a href="https://access.redhat.com/security/cve/CVE-2006-2493">CVE-2006-2493</a>. <a href="http://www.securityfocus.com/archive/1/archive/1/436836/100/0/threaded">http://www.securityfocus.com/archive/1/archive/1/436836/100/0/threaded</a> <a href="http://sourceforge.net/project/shownotes.php?release_id=416463">http://sourceforge.net/project/shownotes.php?release_id=416463</a> <a href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593</a> <a href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8</a> <a href="https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606">https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606</a> <a href="https://issues.rpath.com/browse/RPL-429">https://issues.rpath.com/browse/RPL-429</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freetype | <0:2.0.3-17.el21 | 0:2.0.3-17.el21 |
redhat/freetype | <0:2.1.4-4.0.rhel3.2 | 0:2.1.4-4.0.rhel3.2 |
redhat/freetype | <0:2.1.4-12.el3 | 0:2.1.4-12.el3 |
redhat/freetype | <0:2.1.9-1.rhel4.4 | 0:2.1.9-1.rhel4.4 |
redhat/freetype | <0:2.1.9-10.el4.7 | 0:2.1.9-10.el4.7 |
FreeType | =2.0.9 | |
FreeType | =2.1.3 | |
FreeType | =2.1.4 | |
FreeType | =2.1.5 | |
FreeType | =2.1.6 | |
FreeType | =2.1.7 | |
FreeType | =2.1.8 | |
FreeType | =2.1.9 | |
FreeType | =2.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)