Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2006-2661
ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.103
EPSS Ranking
92.8%
CVSS Severity
CVSS v2 Score
5.0
References
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
http://secunia.com/advisories/20525
http://secunia.com/advisories/20591
http://secunia.com/advisories/20638
http://secunia.com/advisories/20791
http://secunia.com/advisories/21062
http://secunia.com/advisories/21135
http://secunia.com/advisories/21385
http://secunia.com/advisories/21701
http://secunia.com/advisories/23939
http://securitytracker.com/id?1016520
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
http://www.debian.org/security/2006/dsa-1095
http://www.mandriva.com/security/advisories?name=MDKSA-2006:099
http://www.redhat.com/support/errata/RHSA-2006-0500.html
http://www.securityfocus.com/archive/1/436836/100/0/threaded
http://www.securityfocus.com/bid/18329
http://www.vupen.com/english/advisories/2007/0381
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676
https://issues.rpath.com/browse/RPL-429
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11692
https://usn.ubuntu.com/291-1/
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0012.html
http://secunia.com/advisories/20525
http://secunia.com/advisories/20591
http://secunia.com/advisories/20638
http://secunia.com/advisories/20791
http://secunia.com/advisories/21062
http://secunia.com/advisories/21135
http://secunia.com/advisories/21385
http://secunia.com/advisories/21701
http://secunia.com/advisories/23939
http://securitytracker.com/id?1016520
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
http://www.debian.org/security/2006/dsa-1095
http://www.mandriva.com/security/advisories?name=MDKSA-2006:099
http://www.redhat.com/support/errata/RHSA-2006-0500.html
http://www.securityfocus.com/archive/1/436836/100/0/threaded
http://www.securityfocus.com/bid/18329
http://www.vupen.com/english/advisories/2007/0381
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183676
https://issues.rpath.com/browse/RPL-429
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11692
https://usn.ubuntu.com/291-1/
Products affected by CVE-2006-2661
Freetype
»
Freetype
»
Version:
N/A
cpe:2.3:a:freetype:freetype:-
Freetype
»
Freetype
»
Version:
1.3.1
cpe:2.3:a:freetype:freetype:1.3.1
Freetype
»
Freetype
»
Version:
2.0
cpe:2.3:a:freetype:freetype:2.0
Freetype
»
Freetype
»
Version:
2.0.0
cpe:2.3:a:freetype:freetype:2.0.0
Freetype
»
Freetype
»
Version:
2.0.1
cpe:2.3:a:freetype:freetype:2.0.1
Freetype
»
Freetype
»
Version:
2.0.2
cpe:2.3:a:freetype:freetype:2.0.2
Freetype
»
Freetype
»
Version:
2.0.3
cpe:2.3:a:freetype:freetype:2.0.3
Freetype
»
Freetype
»
Version:
2.0.4
cpe:2.3:a:freetype:freetype:2.0.4
Freetype
»
Freetype
»
Version:
2.0.5
cpe:2.3:a:freetype:freetype:2.0.5
Freetype
»
Freetype
»
Version:
2.0.6
cpe:2.3:a:freetype:freetype:2.0.6
Freetype
»
Freetype
»
Version:
2.0.7
cpe:2.3:a:freetype:freetype:2.0.7
Freetype
»
Freetype
»
Version:
2.0.8
cpe:2.3:a:freetype:freetype:2.0.8
Freetype
»
Freetype
»
Version:
2.0.9
cpe:2.3:a:freetype:freetype:2.0.9
Freetype
»
Freetype
»
Version:
2.1
cpe:2.3:a:freetype:freetype:2.1
Freetype
»
Freetype
»
Version:
2.1.0
cpe:2.3:a:freetype:freetype:2.1.0
Freetype
»
Freetype
»
Version:
2.1.1
cpe:2.3:a:freetype:freetype:2.1.1
Freetype
»
Freetype
»
Version:
2.1.10
cpe:2.3:a:freetype:freetype:2.1.10
Freetype
»
Freetype
»
Version:
2.1.2
cpe:2.3:a:freetype:freetype:2.1.2
Freetype
»
Freetype
»
Version:
2.1.3
cpe:2.3:a:freetype:freetype:2.1.3
Freetype
»
Freetype
»
Version:
2.1.4
cpe:2.3:a:freetype:freetype:2.1.4
Freetype
»
Freetype
»
Version:
2.1.5
cpe:2.3:a:freetype:freetype:2.1.5
Freetype
»
Freetype
»
Version:
2.1.6
cpe:2.3:a:freetype:freetype:2.1.6
Freetype
»
Freetype
»
Version:
2.1.7
cpe:2.3:a:freetype:freetype:2.1.7
Freetype
»
Freetype
»
Version:
2.1.8
cpe:2.3:a:freetype:freetype:2.1.8
Freetype
»
Freetype
»
Version:
2.1.8_rc1
cpe:2.3:a:freetype:freetype:2.1.8_rc1
Freetype
»
Freetype
»
Version:
2.1.9
cpe:2.3:a:freetype:freetype:2.1.9
Canonical
»
Ubuntu Linux
»
Version:
5.04
cpe:2.3:o:canonical:ubuntu_linux:5.04
Canonical
»
Ubuntu Linux
»
Version:
5.10
cpe:2.3:o:canonical:ubuntu_linux:5.10
Canonical
»
Ubuntu Linux
»
Version:
6.06
cpe:2.3:o:canonical:ubuntu_linux:6.06
Debian
»
Debian Linux
»
Version:
3.0
cpe:2.3:o:debian:debian_linux:3.0
Debian
»
Debian Linux
»
Version:
3.1
cpe:2.3:o:debian:debian_linux:3.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved