Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2006-3467
Description:Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
Test IDs: 1.3.6.1.4.1.25623.1.0.62281   1.3.6.1.4.1.25623.1.0.65031   1.3.6.1.4.1.25623.1.0.57382   1.3.6.1.4.1.25623.1.0.57272   1.3.6.1.4.1.25623.1.0.57342   1.3.6.1.4.1.25623.1.0.57882   1.3.6.1.4.1.25623.1.0.62284   1.3.6.1.4.1.25623.1.0.57431   1.3.6.1.4.1.25623.1.0.62297   1.3.6.1.4.1.25623.1.0.59367   1.3.6.1.4.1.25623.1.0.57287   1.3.6.1.4.1.25623.1.0.57185   1.3.6.1.4.1.25623.1.1.12.2006.324.1   1.3.6.1.4.1.25623.1.0.58696   1.3.6.1.4.1.25623.1.1.12.2006.341.1   1.3.6.1.4.1.25623.1.0.57273   1.3.6.1.4.1.25623.1.0.57409  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2006-3467
1016522
http://securitytracker.com/id?1016522
102705
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
2006-0052
http://www.trustix.org/errata/2006/0052/
20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
20060825 rPSA-2006-0157-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs
http://www.securityfocus.com/archive/1/444318/100/0/threaded
20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1
http://www.securityfocus.com/archive/1/451419/100/200/threaded
20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
http://www.securityfocus.com/archive/1/451404/100/0/threaded
20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451417/100/200/threaded
20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451426/100/200/threaded
21062
http://secunia.com/advisories/21062
21135
http://secunia.com/advisories/21135
21144
http://secunia.com/advisories/21144
21232
http://secunia.com/advisories/21232
21285
http://secunia.com/advisories/21285
21566
http://secunia.com/advisories/21566
21567
http://secunia.com/advisories/21567
21606
http://secunia.com/advisories/21606
21626
http://secunia.com/advisories/21626
21701
http://secunia.com/advisories/21701
21793
http://secunia.com/advisories/21793
21798
http://secunia.com/advisories/21798
21836
http://secunia.com/advisories/21836
22027
http://secunia.com/advisories/22027
22332
http://secunia.com/advisories/22332
22875
http://secunia.com/advisories/22875
22907
http://secunia.com/advisories/22907
23400
http://secunia.com/advisories/23400
23939
http://secunia.com/advisories/23939
27271
http://secunia.com/advisories/27271
33937
http://secunia.com/advisories/33937
ADV-2006-4502
http://www.vupen.com/english/advisories/2006/4502
ADV-2006-4522
http://www.vupen.com/english/advisories/2006/4522
ADV-2007-0381
http://www.vupen.com/english/advisories/2007/0381
APPLE-SA-2009-02-12
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
DSA-1178
http://www.debian.org/security/2006/dsa-1178
DSA-1193
http://www.debian.org/security/2006/dsa-1193
GLSA-200609-04
http://security.gentoo.org/glsa/glsa-200609-04.xml
MDKSA-2006:129
http://www.mandriva.com/security/advisories?name=MDKSA-2006:129
MDKSA-2006:148
http://www.mandriva.com/security/advisories?name=MDKSA-2006:148
RHSA-2006:0500
http://www.redhat.com/support/errata/RHSA-2006-0500.html
RHSA-2006:0634
http://www.redhat.com/support/errata/RHSA-2006-0634.html
RHSA-2006:0635
http://www.redhat.com/support/errata/RHSA-2006-0635.html
SUSE-SA:2006:045
http://lists.suse.com/archive/suse-security-announce/2006-Aug/0002.html
SUSE-SR:2007:021
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
USN-324-1
http://www.ubuntu.com/usn/usn-324-1
USN-341-1
http://www.ubuntu.com/usn/usn-341-1
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
http://support.apple.com/kb/HT3438
http://support.apple.com/kb/HT3438
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-186.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-186.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-284.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-284.htm
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
oval:org.mitre.oval:def:10673
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10673




© 1998-2025 E-Soft Inc. All rights reserved.