Vulnerability CVE-2016-1521


Published: 2016-02-12   Modified: 2016-02-13

Description:
The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
SIL -> Graphite 2 
SIL -> Graphite2 
Mozilla -> Firefox 
Mozilla -> Firefox esr 
Mozilla -> Thunderbird 
Fedoraproject -> Fedora 
Debian -> Debian linux 

 References:
http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
http://rhn.redhat.com/errata/RHSA-2016-0197.html
http://rhn.redhat.com/errata/RHSA-2016-0258.html
http://rhn.redhat.com/errata/RHSA-2016-0594.html
http://www.debian.org/security/2016/dsa-3479
http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/82991
http://www.ubuntu.com/usn/USN-2902-1
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://security.gentoo.org/glsa/201701-35
https://security.gentoo.org/glsa/201701-63

Copyright 2024, cxsecurity.com

 

Back to Top