fkie_cve-2006-1861
Vulnerability from fkie_nvd
Published
2006-05-23 10:06
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by CVE-2006-2493.
References
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
secalert@redhat.comhttp://secunia.com/advisories/20100Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20525Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20591Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20638Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20791Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/21000Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/21062Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/21135Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/21385Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/21701Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/23939Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/27162Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/27167Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/27271Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/33937Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/35200Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/35204Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/35233Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200607-02.xml
secalert@redhat.comhttp://securitytracker.com/id?1016522
secalert@redhat.comhttp://sourceforge.net/project/shownotes.php?release_id=416463Patch
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
secalert@redhat.comhttp://support.apple.com/kb/HT3438
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1095
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200710-09.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:099
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0500.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-0329.htmlVendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-1062.htmlVendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/436836/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/18034Patch
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/1868Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0381Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606
secalert@redhat.comhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
secalert@redhat.comhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=502565
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/26553
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-429
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124
secalert@redhat.comhttps://usn.ubuntu.com/291-1/
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20100Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20525Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20591Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20638Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20791Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21000Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21062Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21135Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21385Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21701Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23939Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27162Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27167Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27271Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33937Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35200Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35204Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35233Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200607-02.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016522
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=416463Patch
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3438
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1095
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200710-09.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:099
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0500.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0329.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1062.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/436836/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18034Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1868Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0381Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=502565
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26553
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-429
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/291-1/
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
Impacted products
Vendor Product Version
freetype freetype 2.0.9
freetype freetype 2.1.3
freetype freetype 2.1.4
freetype freetype 2.1.5
freetype freetype 2.1.6
freetype freetype 2.1.7
freetype freetype 2.1.8
freetype freetype 2.1.9
freetype freetype 2.1.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "28CA4C7D-D70A-44CF-8E3D-F2612CCA0799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "369D87D8-E4A7-4EC4-B508-2940EE174F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "288FDB59-7FE4-4351-8822-554ADF07C79A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B681257A-F8D8-46D5-995D-BC44F54DD5C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E0DEB6-4414-49AB-88E9-988CE5D8EF67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A90D08-2CAF-422F-8587-7D88EC7632A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B944FEB-F69D-4F6C-9485-26F95A5874B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73474B9-6853-4C5C-9CB9-5F4D3080D1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5283E910-D512-481C-804E-8717A83B24CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493."
    }
  ],
  "id": "CVE-2006-1861",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-23T10:06:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20100"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20525"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20591"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20638"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20791"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21000"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21062"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21135"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21385"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21701"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23939"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27162"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27167"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27271"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35200"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35204"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35233"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200607-02.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1016522"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=416463"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2006/dsa-1095"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-09.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:099"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0500.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/436836/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/18034"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1868"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0381"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502565"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26553"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-429"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/291-1/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20525"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20638"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27162"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35200"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35204"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200607-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016522"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=416463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT3438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1095"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-09.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0500.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/436836/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/18034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=128606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593#c8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/291-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…