// For flags

CVE-2006-3740

 

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.

Desbordamiento de entero en la función scan_cidfont en X.Org 6.8.2 and XFree86 X server , permite a un usuario local ejecutar código de su elección a través de la fuentes de datos(1) CMap y (2)CIDFont con contadores modificados en las secciones (a) begincodespacerange, (b) cidrange, y (c) notdefrange

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-07-20 CVE Reserved
  • 2006-09-13 CVE Published
  • 2024-02-05 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (41)
URL Tag Source
http://secunia.com/advisories/21864 Third Party Advisory
http://secunia.com/advisories/21889 Third Party Advisory
http://secunia.com/advisories/21890 Third Party Advisory
http://secunia.com/advisories/21894 Third Party Advisory
http://secunia.com/advisories/21900 Third Party Advisory
http://secunia.com/advisories/21904 Third Party Advisory
http://secunia.com/advisories/21908 Third Party Advisory
http://secunia.com/advisories/21924 Third Party Advisory
http://secunia.com/advisories/22080 Third Party Advisory
http://secunia.com/advisories/22141 Third Party Advisory
http://secunia.com/advisories/22332 Third Party Advisory
http://secunia.com/advisories/22560 Third Party Advisory
http://secunia.com/advisories/23033 Third Party Advisory
http://secunia.com/advisories/23899 Third Party Advisory
http://secunia.com/advisories/23907 Third Party Advisory
http://secunia.com/advisories/24636 Third Party Advisory
http://securitytracker.com/id?1016828 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm X_refsource_confirm
http://www.securityfocus.com/archive/1/445812/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/464268/100/0/threaded Mailing List
http://www.securityfocus.com/bid/19974 Vdb Entry
http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html X_refsource_confirm
http://www.vupen.com/english/advisories/2006/3581 Vdb Entry
http://www.vupen.com/english/advisories/2006/3582 Vdb Entry
http://www.vupen.com/english/advisories/2007/0322 Vdb Entry
http://www.vupen.com/english/advisories/2007/1171 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/28890 Vdb Entry
https://issues.rpath.com/browse/RPL-614 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9454 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
X.org
Search vendor "X.org"
X.org
Search vendor "X.org" for product "X.org"
6.8.2
Search vendor "X.org" for product "X.org" and version "6.8.2"
-
Affected
Xfree86 Project
Search vendor "Xfree86 Project"
Xfree86 X
Search vendor "Xfree86 Project" for product "Xfree86 X"
*-
Affected