PT-2016-1428 · Mozilla +5 · Firefox Esr +7
Tsmith
+1
·
Published
2016-03-07
·
Updated
2024-10-22
·
CVE-2016-2791
8.8
High
Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Graphite 2 versions prior to 1.3.6
Mozilla Firefox versions prior to 45.0
Mozilla Firefox ESR 38.x versions prior to 38.7
Description:
The issue is caused by a buffer overflow in the graphite2::GlyphCache::glyph function of Graphite 2, which is used in Mozilla Firefox and Firefox ESR. This can be exploited by a remote attacker using a specially crafted Graphite smart font, potentially leading to a denial of service or other unspecified impacts.
Recommendations:
For Graphite 2 versions prior to 1.3.6, update to version 1.3.6 or later.
For Mozilla Firefox versions prior to 45.0, update to version 45.0 or later.
For Mozilla Firefox ESR 38.x versions prior to 38.7, update to version 38.7 or later.
Exploit
Fix
DoS
Buffer Overflow
Weakness Enumeration
Related Identifiers
Affected Products
References · 1452
- 🔥 https://github.com/llamakko/CVE-2015-7214⭐ 14 🔗 6 · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950 · Security Note
- http://debian.org/security/2016/dsa-3515 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509 · Security Note
- https://mozilla.org/en-US/security/advisories/mfsa2016-25 · Vendor Advisory
- https://bdu.fstec.ru/vul/2018-00029 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504 · Security Note
- https://bdu.fstec.ru/vul/2015-12243 · Security Note
- https://bdu.fstec.ru/vul/2015-12010 · Security Note
- https://bdu.fstec.ru/vul/2016-00747 · Security Note
- https://bdu.fstec.ru/vul/2016-00573 · Security Note
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html · Vendor Advisory
- https://ubuntu.com/security/CVE-2016-1956 · Vendor Advisory