{"api_version":"1","generated_at":"2026-04-22T23:51:54+00:00","cve":"CVE-2006-3739","urls":{"html":"https://cve.report/CVE-2006-3739","api":"https://cve.report/api/cve/CVE-2006-3739.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-3739","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-3739"},"summary":{"title":"CVE-2006-3739","description":"Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2006-09-13 01:07:00","updated_at":"2018-10-17 21:29:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://www.vupen.com/english/advisories/2007/1171","name":"ADV-2007-1171","refsource":"VUPEN","tags":[],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-344-1","name":"USN-344-1","refsource":"UBUNTU","tags":[],"title":"usn/usn-344-1 - Ubuntu: Linux for human beings","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html","name":"http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html","refsource":"CONFIRM","tags":[],"title":"VMware ESX Server 2.5.4 Upgrade Patch 5 (for 2.5.4 Systems Only)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21864","name":"21864","refsource":"SECUNIA","tags":[],"title":"X11 libXfont CID Encoded Fonts Integer Overflows - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21924","name":"21924","refsource":"SECUNIA","tags":[],"title":"Mandriva update for xorg-x11 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102780-1","name":"102780","refsource":"SUNALERT","tags":[],"title":"#102780: Two Integer Overflow Vulnerabilities Found in the Xorg(1) X Server","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/19974","name":"19974","refsource":"BID","tags":[],"title":"X.Org LibXfont CID Font File Multiple Integer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:164","name":"MDKSA-2006:164","refsource":"MANDRIVA","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22141","name":"22141","refsource":"SECUNIA","tags":[],"title":"Avaya Modular Messaging X11 libXfont Integer Overflows - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22080","name":"22080","refsource":"SECUNIA","tags":[],"title":"SUSE Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21894","name":"21894","refsource":"SECUNIA","tags":[],"title":"Ubuntu updates for libxfont / xorg - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21900","name":"21900","refsource":"SECUNIA","tags":[],"title":"Red Hat update for XFree86 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2006_23_sr.html","name":"SUSE-SR:2006:023","refsource":"SUSE","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/464268/100/0/threaded","name":"20070330 VMSA-2007-0002 VMware ESX security updates","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/0322","name":"ADV-2007-0322","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0665.html","name":"RHSA-2006:0665","refsource":"REDHAT","tags":["Patch","Vendor Advisory"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://issues.rpath.com/browse/RPL-614","name":"https://issues.rpath.com/browse/RPL-614","refsource":"CONFIRM","tags":[],"title":"[#RPL-614] local root privilege escalation vulnerabilities in CID fonts parser: CVE-2006-3739 CVE-2006-3740 - rPath JIRA","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/21904","name":"21904","refsource":"SECUNIA","tags":[],"title":"rPath update for xorg-x11 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21889","name":"21889","refsource":"SECUNIA","tags":[],"title":"Red Hat update for xorg-x11 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21890","name":"21890","refsource":"SECUNIA","tags":[],"title":"XFree86 CID Encoded Fonts Integer Overflows - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102714-1","name":"102714","refsource":"SUNALERT","tags":[],"title":"#102714: Security Vulnerability With Integer Multiplication Within libXfont Affects Solaris X11 Servers","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/445812/100/0/threaded","name":"20060912 rPSA-2006-0167-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3582","name":"ADV-2006-3582","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.idefense.com/intelligence/vulnerabilities/display.php?id=412","name":"20060912 Multiple Vendor X Server CID-keyed Fonts 'CIDAFM()' Integer Overflow Vulnerability","refsource":"IDEFENSE","tags":["Patch","Vendor Advisory"],"title":"Accenture | Let there be change","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200609-07.xml","name":"GLSA-200609-07","refsource":"GENTOO","tags":[],"title":"Gentoo Linux Documentation\n--\n  LibXfont, monolithic X.org: Multiple integer overflows","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22332","name":"22332","refsource":"SECUNIA","tags":[],"title":"Debian update for xfree86 - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10305","name":"oval:org.mitre.oval:def:10305","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-1193","name":"DSA-1193","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-1193-1 xfree86","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23899","name":"23899","refsource":"SECUNIA","tags":[],"title":"Sun Solaris 10 Xorg X Server Integer Overflows - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm","refsource":"CONFIRM","tags":[],"title":"ASA-2006-190 (RHSA-2006-0665)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0666.html","name":"RHSA-2006:0666","refsource":"REDHAT","tags":["Patch","Vendor Advisory"],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24636","name":"24636","refsource":"SECUNIA","tags":[],"title":"VMware ESX Server Multiple Security Updates - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3581","name":"ADV-2006-3581","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23033","name":"23033","refsource":"SECUNIA","tags":[],"title":"Mandriva update for xorg-x11 - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016828","name":"1016828","refsource":"SECTRACK","tags":[],"title":"SecurityTracker.com Archives - X Buffer Overflow in Processing CID-encoded Type1 Fonts Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21908","name":"21908","refsource":"SECUNIA","tags":[],"title":"Gentoo update for libXfont - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm","refsource":"CONFIRM","tags":[],"title":"ASA-2006-191 (RHSA-2006-0666)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28899","name":"xorg-server-cidafm-overflow(28899)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22560","name":"22560","refsource":"SECUNIA","tags":[],"title":"Avaya Products XFree86 Integer Overflow Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-3739","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-3739","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"3739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"6.8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3739","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"x.org","cpe5":"x.org","cpe6":"6.8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3739","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xfree86_project","cpe5":"xfree86_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3739","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xfree86_project","cpe5":"xfree86_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2006-3739","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"http://secunia.com/advisories/24636","refsource":"MISC","name":"http://secunia.com/advisories/24636"},{"url":"http://www.securityfocus.com/archive/1/464268/100/0/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/464268/100/0/threaded"},{"url":"http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html","refsource":"MISC","name":"http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html"},{"url":"http://www.vupen.com/english/advisories/2007/1171","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/1171"},{"url":"http://secunia.com/advisories/22080","refsource":"MISC","name":"http://secunia.com/advisories/22080"},{"url":"http://www.novell.com/linux/security/advisories/2006_23_sr.html","refsource":"MISC","name":"http://www.novell.com/linux/security/advisories/2006_23_sr.html"},{"url":"http://secunia.com/advisories/21864","refsource":"MISC","name":"http://secunia.com/advisories/21864"},{"url":"http://secunia.com/advisories/21889","refsource":"MISC","name":"http://secunia.com/advisories/21889"},{"url":"http://secunia.com/advisories/21890","refsource":"MISC","name":"http://secunia.com/advisories/21890"},{"url":"http://secunia.com/advisories/21894","refsource":"MISC","name":"http://secunia.com/advisories/21894"},{"url":"http://secunia.com/advisories/21900","refsource":"MISC","name":"http://secunia.com/advisories/21900"},{"url":"http://secunia.com/advisories/21904","refsource":"MISC","name":"http://secunia.com/advisories/21904"},{"url":"http://secunia.com/advisories/21908","refsource":"MISC","name":"http://secunia.com/advisories/21908"},{"url":"http://secunia.com/advisories/21924","refsource":"MISC","name":"http://secunia.com/advisories/21924"},{"url":"http://secunia.com/advisories/22141","refsource":"MISC","name":"http://secunia.com/advisories/22141"},{"url":"http://secunia.com/advisories/22332","refsource":"MISC","name":"http://secunia.com/advisories/22332"},{"url":"http://secunia.com/advisories/22560","refsource":"MISC","name":"http://secunia.com/advisories/22560"},{"url":"http://secunia.com/advisories/23033","refsource":"MISC","name":"http://secunia.com/advisories/23033"},{"url":"http://secunia.com/advisories/23899","refsource":"MISC","name":"http://secunia.com/advisories/23899"},{"url":"http://security.gentoo.org/glsa/glsa-200609-07.xml","refsource":"MISC","name":"http://security.gentoo.org/glsa/glsa-200609-07.xml"},{"url":"http://securitytracker.com/id?1016828","refsource":"MISC","name":"http://securitytracker.com/id?1016828"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102714-1","refsource":"MISC","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102714-1"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102780-1","refsource":"MISC","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102780-1"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm","refsource":"MISC","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm","refsource":"MISC","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm"},{"url":"http://www.debian.org/security/2006/dsa-1193","refsource":"MISC","name":"http://www.debian.org/security/2006/dsa-1193"},{"url":"http://www.idefense.com/intelligence/vulnerabilities/display.php?id=412","refsource":"MISC","name":"http://www.idefense.com/intelligence/vulnerabilities/display.php?id=412"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:164","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:164"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0665.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2006-0665.html"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0666.html","refsource":"MISC","name":"http://www.redhat.com/support/errata/RHSA-2006-0666.html"},{"url":"http://www.securityfocus.com/archive/1/445812/100/0/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/445812/100/0/threaded"},{"url":"http://www.securityfocus.com/bid/19974","refsource":"MISC","name":"http://www.securityfocus.com/bid/19974"},{"url":"http://www.ubuntu.com/usn/usn-344-1","refsource":"MISC","name":"http://www.ubuntu.com/usn/usn-344-1"},{"url":"http://www.vupen.com/english/advisories/2006/3581","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/3581"},{"url":"http://www.vupen.com/english/advisories/2006/3582","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/3582"},{"url":"http://www.vupen.com/english/advisories/2007/0322","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2007/0322"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28899","refsource":"MISC","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28899"},{"url":"https://issues.rpath.com/browse/RPL-614","refsource":"MISC","name":"https://issues.rpath.com/browse/RPL-614"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10305","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10305"}]}},"nvd":{"publishedDate":"2006-09-13 01:07:00","lastModifiedDate":"2018-10-17 21:29:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:xfree86_project:xfree86_x:*:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"3739","Ordinal":"19065","Title":"CVE-2006-3739","CVE":"CVE-2006-3739","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"3739","Ordinal":"1","NoteData":"Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"3739","Ordinal":"2","NoteData":"2006-09-12","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"3739","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}