CVE-2006-2661
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
30/05/2006
Last modified:
03/04/2025
Description
ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:* | 2.2 (excluding) | |
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
- http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
- http://secunia.com/advisories/20525
- http://secunia.com/advisories/20591
- http://secunia.com/advisories/20638
- http://secunia.com/advisories/20791
- http://secunia.com/advisories/21062
- http://secunia.com/advisories/21135
- http://secunia.com/advisories/21385
- http://secunia.com/advisories/21701
- http://secunia.com/advisories/23939
- http://securitytracker.com/id?1016520=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
- http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
- http://www.debian.org/security/2006/dsa-1095
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A099
- http://www.redhat.com/support/errata/RHSA-2006-0500.html
- http://www.securityfocus.com/archive/1/436836/100/0/threaded
- http://www.securityfocus.com/bid/18329
- http://www.vupen.com/english/advisories/2007/0381
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676
- https://issues.rpath.com/browse/RPL-429
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11692
- https://usn.ubuntu.com/291-1/
- ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
- http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
- http://secunia.com/advisories/20525
- http://secunia.com/advisories/20591
- http://secunia.com/advisories/20638
- http://secunia.com/advisories/20791
- http://secunia.com/advisories/21062
- http://secunia.com/advisories/21135
- http://secunia.com/advisories/21385
- http://secunia.com/advisories/21701
- http://secunia.com/advisories/23939
- http://securitytracker.com/id?1016520=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
- http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
- http://www.debian.org/security/2006/dsa-1095
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A099
- http://www.redhat.com/support/errata/RHSA-2006-0500.html
- http://www.securityfocus.com/archive/1/436836/100/0/threaded
- http://www.securityfocus.com/bid/18329
- http://www.vupen.com/english/advisories/2007/0381
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676
- https://issues.rpath.com/browse/RPL-429
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11692
- https://usn.ubuntu.com/291-1/