The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox prior to 43.0 and Firefox ESR 38.x prior to 38.6.1, does not validate a certain skip operation, which allows remote malicious users to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian debian linux 8.0 |
||
debian debian linux 7.0 |
||
sil graphite2 |
||
mozilla firefox esr 38.2.1 |
||
mozilla firefox esr 38.2.0 |
||
mozilla firefox esr 38.4.0 |
||
mozilla firefox esr 38.3.0 |
||
mozilla firefox |
||
mozilla firefox esr 38.6.0 |
||
mozilla firefox esr 38.5.2 |
||
mozilla firefox esr 38.1.1 |
||
mozilla firefox esr 38.1.0 |
||
mozilla firefox esr 38.5.1 |
||
mozilla firefox esr 38.5.0 |
||
mozilla firefox esr 38.0.5 |
||
mozilla firefox esr 38.0.1 |
||
mozilla thunderbird |
||
fedoraproject fedora 23 |
||
fedoraproject fedora 22 |
Libgraphite font library buggy and vulnerable in Firefox, Thunderbird, WordPad and more says Talos
Updated Cisco-owned Talos has announced a bunch of font library bugs present in apps running on Windows and Linux, affecting client and-server-side machines. The problem is in the Libgraphite library, and means that applications using the library to load .TTF font files can inherit its vulnerabilities. All that's needed for a successful exploit, Talos writes, is that the user be tricked into running a Graphite-enabled application rendering a page with a maliciously crafted font. Since Libgraphit...