Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21864 - | |
References | () http://secunia.com/advisories/21889 - | |
References | () http://secunia.com/advisories/21890 - | |
References | () http://secunia.com/advisories/21894 - | |
References | () http://secunia.com/advisories/21900 - | |
References | () http://secunia.com/advisories/21904 - | |
References | () http://secunia.com/advisories/21908 - | |
References | () http://secunia.com/advisories/21924 - | |
References | () http://secunia.com/advisories/22080 - | |
References | () http://secunia.com/advisories/22141 - | |
References | () http://secunia.com/advisories/22332 - | |
References | () http://secunia.com/advisories/22560 - | |
References | () http://secunia.com/advisories/23033 - | |
References | () http://secunia.com/advisories/23899 - | |
References | () http://secunia.com/advisories/23907 - | |
References | () http://secunia.com/advisories/24636 - | |
References | () http://security.gentoo.org/glsa/glsa-200609-07.xml - | |
References | () http://securitytracker.com/id?1016828 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102780-1 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm - | |
References | () http://www.debian.org/security/2006/dsa-1193 - | |
References | () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=411 - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:164 - | |
References | () http://www.novell.com/linux/security/advisories/2006_23_sr.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0665.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0666.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/445812/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/464268/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19974 - | |
References | () http://www.ubuntu.com/usn/usn-344-1 - | |
References | () http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html - | |
References | () http://www.vupen.com/english/advisories/2006/3581 - | |
References | () http://www.vupen.com/english/advisories/2006/3582 - | |
References | () http://www.vupen.com/english/advisories/2007/0322 - | |
References | () http://www.vupen.com/english/advisories/2007/1171 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28890 - | |
References | () https://issues.rpath.com/browse/RPL-614 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9454 - |
Information
Published : 2006-09-13 01:07
Updated : 2024-11-21 00:14
NVD link : CVE-2006-3740
Mitre link : CVE-2006-3740
CVE.ORG link : CVE-2006-3740
JSON object : View
Products Affected
xfree86_project
- xfree86_x
x.org
- x.org
CWE